https://jios.foi.hr/index.php/jios/issue/feedJournal of Information and Organizational Sciences2015-07-06T16:01:19+02:00Alen Lovrenčićalen.lovrencic@foi.hrOpen Journal Systems<table border="0"><tbody><tr><td valign="top"><p><br /><img title="http://veles.foi.hr/jios/public/site/images/dagrabar/jios_404_02" src="http://veles.foi.hr/jios/public/site/images/dagrabar/jios_404_02.jpg" alt="http://veles.foi.hr/jios/public/site/images/dagrabar/jios_404_02" width="383" height="404" align="left" hspace="10" />Journal of Information and Organizational Sciences of the Faculty of Organization and Informatics in Varazdin publishes original scientific papers, preliminary communications, review articles, conference papers and professional papers from the field of information and organizational sciences, as well as relevant contributions from related scientific disciplines. </p><p> </p><p>ISSN 1846-9418 (online)<br />ISSN 1846-3312 (print)</p><p><strong>Publisher:</strong></p><p>Faculty of Organization and Informatics<br />University of Zagreb<br />Pavlinska 2, 4200 Varaždin, Croatia</p><p>tel: +385 42 390 827, fax: +385 42 213 413<br />email: <br />jios@foi.hr (Correspondence Mail)<br />jios-pub@foi.hr (Publishing Board)</p><p><span><br /></span></p></td><td style="border-left: 1px solid #AAA; pading-left: 10px;" valign="top" width="300px"><p><span>JIOS is indexed in following databases:</span></p><ul><li><span>Computer and Information Systems Abstracts</span></li><li><span>CSA Technology Research Database</span></li><li><span>Directory of Open Access Journals</span></li><li><span>Directory of Research Journals Indexing<br /></span></li><li><span>Index Copernicus<br /></span></li><li><span>INSPEC</span></li><li><span>Library and Information Science Abstracts (LISA)</span></li><li>Library Literature &amp; Information Science Full Text database - EBSCO</li><li><span>OAIster</span></li><li><span>SCOPUS </span></li><li><span>VINITI RAN</span></li></ul></td></tr></tbody></table>https://jios.foi.hr/index.php/jios/article/view/30ROLE OF UML SEQUENCE DIAGRAM CONSTRUCTS IN OBJECT LIFECYCLE CONCEPT2008-03-18T15:38:30+01:00Miroslav Grgecmigrgec@foi.hrRobert Mužarrobert.muzar@foi.hrWhen modeling systems and using UML concepts, a real system can be viewed in several ways. The RUP (Rational Unified Process) defines the "4 + 1 view": 1. Logical view (class diagram (CD), object diagram (OD), sequence diagram (SD), collaboration diagram (COD), state chart diagram (SCD), activity diagram (AD)), 2.Process view (use case diagram, CD, OD, SD, COD, SCD, AD), 3. Development view (package diagram, component diagram), 4. Physical view (deployment diagram), and 5. Use case view (use case diagram, OD, SD, COD, SCD, AD) which combines the four mentioned above. With sequence diagram constructs we are describing object behavior in scope of one use case and their interaction. Each object in system goes through a so called lifecycle (create, supplement object with data, use object, decommission object). The concept of the object lifecycle is used to understand and formalize the behavior of objects from creation to deletion. With help of sequence diagram concepts our paper will describe the way of interaction modeling between objects through lifeline of each of them, and their importance in software development.https://jios.foi.hr/index.php/jios/article/view/33GENERATION OF A SET OF KEY TERMS CHARACTERISING TEXT DOCUMENTS2008-03-18T16:52:45+01:00Kristina MachovaKristina.Machova@tuke.sk.hrAndrea Szaboovamerciandz@tuke.skPeter BednarPeter.Bednar@tuke.skThe presented paper describes statistical methods (information gain, mutual X^2 statistics, and TF-IDF method) for key words generation from a text document collection. These key words should characterise the content of text documents and can be used to retrieve relevant documents from a document collection. Term relations were detected on the base of conditional probability of term occurrences. The focus is on the detection of those words, which occur together very often. Thus, key words, which consist from two terms were generated additionally. Several tests were carried out using the 20 News Groups collection of text documents.https://jios.foi.hr/index.php/jios/article/view/44TIME SERIES ANALYSIS USING A UNIQUE MODEL OF TRANSFORMATION2008-04-01T15:12:48+02:00Goran Klepacgoran.klepac@rba.hr.comREFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining.https://jios.foi.hr/index.php/jios/article/view/167From the Editor2010-07-05T23:15:13+02:00Neven Vrčekneven.vrcek@foi.hr<div>Dear authors, readers and future authors,</div><div>It is my pleasure to present you the 1st number of the 34th volume of the Journal of Information and Organizational Sciences &ndash; JIOS.</div><div><br /></div><div>In this issue a selection of 11 original scientific papers and 2 preliminary communications has been included, all of which have undergone a rigourous double-blind review process. Some of the papers published here were already presented at the CECIIS 2009 Conference held in Varaždin between 23rd and 25th September 2009. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</div><div>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: semantic web, social networks analysis, LMS interoperability, effective learning environment, game theory, model driven architecture, and other topics in the field of applied information sciences. We hope that the variety of themes will draw the attention of researchers in different ICT fields and motivate potential authors to expand the Journal&rsquo;s thematic scope by other themes that may be of interest to the wider ICT research community.</div><div><br /></div><div>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a peer-reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.</div><div>So far JIOS has been indexed in seven well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers&rsquo; audience, and give your research a greater impact factor.</div>https://jios.foi.hr/index.php/jios/article/view/45A METHOD FOR IMPROVEMENT OF OBJECTIVITY OF E-SERVICE QUALITY EVALUATION2008-03-21T11:23:40+01:00Renata Mekovecrenata.hudek@foi.hrGoran Bubašgoran.bubas@foi.hrNeven Vrčekneven.vrcek@foi.hrMeasurement and improvement of e-service quality is important for sustaining competitive advantage of an e-commerce web site. A number of e-service quality measures have recently been developed that predominantly rely on the subjective evaluation of diverse quality attributes. To increase the objectivity of e-service quality measurement a recently developed measure of e-service quality has been adapted in a way that replaces its Likert type scales for evaluation of specific attributes with check-lists that include specific observable elements for appraisal and a scoring procedure. The consistency of scoring with this adaptation of an e-service quality measure was investigated in comparison to the use of the standard measure with Likert type scales and by the use of untrained and trained evaluators. The results of the empirical evaluation indicate a greater inter-rater consistency when the adapted/objective measure is used for evaluation of the efficiency dimension of e-service quality.https://jios.foi.hr/index.php/jios/article/view/11THE ROLE OF INFORMATION COMUNICATION TECHNOLOGY IN SIX SIGMA APPROACH IMPLEMENTATION2012-04-19T16:43:01+02:00Živko Kondićzkondic@vels.hrVesna Dušakvesna.dusak@foi.hrThe article discusses Six Sigma Methodology as business philosophy assuring excellent product or service quality and continuous process improving to realise highest customer satisfaction level. There are analysed methodology advantages allowing defects and costs reduction and customer satisfaction improvement. Also, authors discuss methodology successful implementation according to gathering data on business processes regulation indicators values variation, and issued products or services performances. The results of implementation process of the Six Sigma Methodology in business system depend on prompt and correct data needed for statistical analysis, and its accessibility via organisation’ information system. Correlation between implementation of Six Sigma Methodology and information system development is so strong that non-conformances could cause the Six Sigma Methodology implementation fall.https://jios.foi.hr/index.php/jios/article/view/26DEVELOPMENT OF AHP BASED MODEL FOR DECISION MAKING ON E-LEARNING IMPLEMENTATION2008-03-18T15:04:14+01:00Nina Begičevićblazenka.divjak@foi.hrBlaženka Divjakblazenka.divjak@foi.hrTihomir Hunjaktihomir.hunjak@foi.hrStrategic planning of e-learning implementation includes decision making about the most suitable form of implementing e-learning on different levels. Decision making about e-learning implementation has been covered as consisting of four phases: (1) intelligence, (2) design, (3) choice and (4) implementation. During the Intelligence phase we have precisely identified our central decision problem and have conducted situation analysis. In the Design phase we have developed alternatives and established criteria and subcriteria. Then, we have created the questionnaire about the importance of the advantages and goals of e-learning implementation and about criteria and subcriteria essential for decision making. The survey has been conducted on the sample of 90 elearning experts in Croatia. Further, we connected these findings with the results of the factor analysis which was performed on the complete survey. The results of the factor analysis have served as input in the multicriteria decision model (AHP) that we have developed in the Choice phase. The AHP model will be presented in the article and qualitative and quantitative evaluation of the model will be indicated.https://jios.foi.hr/index.php/jios/article/view/9A MODEL OF HETEROGENEOUS DISTRIBUTED SYSTEM FOR FOREIGN EXCHANGE PORTFOLIO ANALYSIS2008-03-14T10:49:59+01:00Dragutin Kermekdragutin.kermek@foi.hrNeven Vrčekneven.vrcek@foi.hrTomislav Jakupićtjakupic@yahoo.comThe paper investigates the design of heterogeneous distributed system for foreign exchange portfolio analysis. The proposed model includes few separated and dislocated but connected parts through distributed mechanisms. Making system distributed brings new perspectives to performance busting where software based load balancer gets very important role. Desired system should spread over multiple, heterogeneous platforms in order to fulfil open platform goal. Building such a model incorporates different patterns from GOF design patterns, business patterns, J2EE patterns, integration patterns, enterprise patterns, distributed design patterns to Web services patterns. The authors try to find as much as possible appropriate patterns for planned tasks in order to capture best modelling and programming practices.https://jios.foi.hr/index.php/jios/article/view/6THE MODEL OF THE DOCUMENT MANAGEMENT SYSTEM IN THE PUBLIC SECTOR2008-03-14T10:23:28+01:00Josip Brumecjosip.brumec@foi.hrŽeljko Dobrovićzeljko.dobrovic@foi.hrMartina Tomičićmartina.tomicic@foi.hrModern solutions regarding the use of unstructured information are based on the concept of Content Management (CM), [08] and [09]. This is a good solution for those document contents that will be generated once the CM is in place, but the question remains of what to do with hundreds of millions of documents that have been generated over the course of many years in the public sector. This article analyzes some of the features of the existing document systems in the public sector, and then discusses the needs of business processes reengineering, which are concerned with generating official decisions of relevance for both individual and business end-users. Furthermore, we propose a practically feasible model for the Document Management Systems (DMS) design, based on modern information and communication technologies that can manage and support the use of documents already in the system. In the end, this article takes a look at a general model for the calculation of costs and benefits associated with an introducton of a new DMS.https://jios.foi.hr/index.php/jios/article/view/46ICT IN DEVELOPING COUNTRIES: CONDITION AND IMPROVEMENT BY QMS - SERBIAN CASE STUDY2008-03-21T11:36:19+01:00Miladin Stefanovićmiladin@kg.ac.yuMilan Matijevićcontrol@kg.ac.yuGoran Devedžićcirpis@kg.ac.yuThis paper evaluates the level of Information and Communication Technology (ICT) in the Serbian metal processing sector. This research uses data from the entire metal processing sector in Serbia (Sample: 20 large companies, 27 medium companies, and 247 small companies, overall with 33,057 workers). Data from the Serbian metal processing sector were compared to the relevant data from EU. In this paper, we present problems and steps for improvement of ICT in the Serbian metal processing industry. We will also present development of quality infrastructure necessary for support and improvement of Serbian ICT industry and improvement of ITC sectors in Serbian metal processing industry.https://jios.foi.hr/index.php/jios/article/view/47COLOR MANAGEMENT IMPLEMENTATION IN DIGITAL PHOTOGRAPHY2008-03-21T11:41:32+01:00Maja Strgar Kurečićmstrgar@grf.hrDarko Agićdagic@grf.hrLidija Mandićlmandic@grf.hrDigital cameras on the market today have a great potential to become the powerful tool for capturing images for use in all demanding fields (such as artwork digitalization), so many professionals started using digital technology. But, it is often the case, that it is necessary to spend a lot of time for visual editing and making color corrections in various software applications. In this research, some ICC color management techniques were used and tested to investigate the quicker ways to achieve digital images with improved color reproduction accuracy, without visual editing. A testing procedure for characterizing digital camera is described. This procedure is target-based, thus providing objective measurement of quality. The special color reference target for digital camera characterization was developed, applied and tested. The results show that using proposed methodology, the workflow efficiency and color accuracy can be improved.https://jios.foi.hr/index.php/jios/article/view/36INTERNET ENABLED PUBLIC SERVICES AS A DRIVER OF ECONOMIC GROWTH -CASE STUDY ECROATIA 2006 -2008-03-21T09:32:00+01:00Damir Novotnydamir.novotny@tmc.hrZvonimir Sabatizsabati@foi.hrThe Barcelona European Council called on the European Commission to draw up an eEurope Action Plan in order to widespread penetration of ICT, as powerful driver of growth and employment. Availability of modern on-line public services through e-Government, e-Learning, e-Health and e-Business is to be secured by the Action Plan. The eEurope 2005 is succeeding eEurope 2002 Action Plan which comprises four separate but interlinked tools: policy measures, exchange of good practices, monitoring and benchmarking and overall co ordination of existing policies. Croatia is candidate for accession to EU by 2009, which means that Croatian Government has to implement eEurope Action plan 2005 and Commission's new strategic framework, i2010 - European Information Society 2010. In first part of the paper authors are presenting overall framework of eEurope Action Plan 2005 as well i2010 strategic framework. For the purposes of the paper, authors have conducted a research availability of on-line public services through government, e-Learning, e-Health and e-Business in Croatia 2006.The results of the survey has been benchmarked to the results of similar surveys in New Europe countries.https://jios.foi.hr/index.php/jios/article/view/39RESOLVING DATABASE CONSTRAINT COLLISIONS USING IIS*CASE TOOL2008-03-21T10:14:58+01:00Sonja Ristićsdristic@uns.ns.ac.yuIvan Lukovićivan@uns.ns.ac.yuJelena Pavićevićjelenap@cg.yuPavle Moginpmogin@mcs.vuw.ac.nzIntegrated Information Systems*Case (IIS*Case) R.6.21 is a CASE tool that we developed to support automated database (db) schema design, based on a methodology of gradual integration of independently designed subschemas into a database schema. It provides complete intelligent support for developing db schemas and enables designers to work together and cooperate reaching the most appropriate solutions. The process of independent design of subschemas may lead to collisions in expressing the real world constraints and business rules. IIS*Case uses specialized algorithms for checking the consistency of constraints embedded in the database schema and the subschemas. IIS*Case supports designers in reviewing and validating results obtained after each step of the design process. The paper outlines the process of resolving collisions. A case study based on an imaginary production system is used to illustrate the application of IIS*Case. Different outcomes and their consequences are presented.https://jios.foi.hr/index.php/jios/article/view/14A SURVEY OF THE PROPERTIES OF AGENTS2008-03-14T13:34:56+01:00Kornelije Rabuzinkornelije.rabuzin@foi.hrMirko Malekovićmirko.malekovic@foi.hrMiroslav Bačamiroslav.baca@foi.hrIn the past decade agent systems were considered to be as one of the major fields of study in Artificial Intelligence (AI) field. Many different definitions of agents were presented and several different approaches describing agency can be distinguished. While some authors have tried to define “what” an agent really is, others have tried to identify agents by means of properties which they should possess. Most authors agree on these properties (at least basic set of properties) which are intrinsic to agents. Since agent's definitions are not consistent, we are going to give an overview and list the properties intrinsic to an agent. Many different adjectives were attached to the term agent as well and many different kinds of agents and different architectures emerged too. The aim of this paper it go give an overview of what was going on in the field while taking into consideration main streams and projects. We will also present some guidelines important when modelling agent systems and say something about security issues. Also, some existing problems which restrict the wider usage of agents will be mentioned too.https://jios.foi.hr/index.php/jios/article/view/48FEASIBILITY OF INVESTMENT IN BUSINESS ANALYTICS2008-03-21T11:46:12+01:00Mladen Vargamladen.varga@efzg.hrMiljenko Vukovićmiljenko.vukovic@primera.hrTrends in data processing for decision support show that business users need business analytics, i.e. analytical applications which incorporate a variety of business oriented data analysis techniques and task-specific knowledge. The paper discusses the feasibility of investment in two models of implementing business analytics: custom development and packed analytical applications. The consequences of both models are shown on two models of business analytics implementation in Croatia.https://jios.foi.hr/index.php/jios/article/view/21BUSINESS OPERATIONS BETWEEN EFFICIENCY AND EFFECTIVENESS2008-03-14T15:34:04+01:00Vojko Potočanvojko.potocan@uni-mb.siThe existence and development of organizations depends on achievement of requisite holistic efficiency and effectiveness of their operations and bahaviour. But in theory (of organization and management) and business practice do not exist common understanding of efficiency and effectiveness, their relations and sinergies. When we try to investigate their definitions and relations we must take into account problems of many conflicts, which reflect their “different non-optimalty (unsuitability, inapproapriateness)”. This contribution discusses three theses: 1) how to more (requisitely) holistically understand relations between efficiency and effectiveness in the frame of business (its working and functioning), 2) how to understand their relations from the viewpoint of conflicts, and 3) one can create solution to remove a problem of different conflicts between efficiency and effectiveness in business.https://jios.foi.hr/index.php/jios/article/view/8IDENTIFICATION OF THE FREQUENCY AND THE INTENSITY OF THE THREATS IN THE FUNCTION OF DEVELOPMENT OF THE INFORMATION SYSTEM2008-03-14T10:42:02+01:00Željko Hutinskizeljko.hutinski@foi.hrMiran Zlatovićmiran.zlatovic@foi.hrIgor Balabanigor.balaban@foi.hrIn the process of development of the security system of the information system, the risk assessment is the foundation for selection of the security measures. The reduction of the level of risk and the amount of costs depend upon the adequate selection of the security measures. The quality of the risk assessment depends upon the adequate assessment of the form and the intensity of the threats. If the forms of threats are not monitored in the business system, it should make its own threat assessment, or use experience of others. The best, but also the most time-consuming solution is to develop own security system, while the fastest way is to use experience of others. However, there is the problem of migration of some other solution to our own system. Depending upon the question whether we are adopting the experiences of domestic or foreign business systems, the question of the applicability to the system from the different business environment becomes relevant. This happens because of the significant differences in the form and intensity of threats in certain local environments or different branches of industry.https://jios.foi.hr/index.php/jios/article/view/179Cover pages2010-12-14T10:52:05+01:00Neven Vrčekneven.vrcek@foi.hr<span style="font-size: 11px;">Here you can download journal cover pages.</span>https://jios.foi.hr/index.php/jios/article/view/32BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION2008-03-18T15:46:45+01:00Tonimir Kišasonditonimir.kisasondi@foi.hrMiroslav Bačamiroslav.baca@foi.hrAlen Lovrenčićalen.lovrencic@foi.hrIn this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.https://jios.foi.hr/index.php/jios/article/view/28METHODOLOGY FRAMEWORK FOR PROCESS INTEGRATION AND SERVICE MANAGEMENT2008-03-18T15:19:33+01:00Darko Galinecdarko.galinec@morh.hrSlavko Vidovićslavko.vidovic@foi.hrHistory of information systems development was driven by business system's functions automation and mergers and acquisitions - business subjects integration into a whole. Modern business requires business processes integration through their dynamics and thus enterprise application integration (EAI) as well. In this connection it is necessary to find ways and means of application integration and interaction in a consistent and reliable way. The real-time enterprise (RTE) monitors, captures and analyzes root causes and overt events that are critical to its success the instant those events occur [6]. EAI is determined by business needs and business requirements. It must be based on business process repository and models, business integration methodology (BIM) and information flow as well. Decisions concerning technology must be in function of successful application integration. In this paper EAI methodological framework and technological concepts for its achievements are introduced.https://jios.foi.hr/index.php/jios/article/view/18ENHANCING LEAN SUPPLY CHAIN MATURITY WITH BUSINESS PROCESS MANAGEMENT2008-03-14T15:21:05+01:00Jurij Jaklicjurij.jaklic@ef.uni-lj.siPeter Trkmanpeter.trkman@ef.uni-lj.siAles Groznikales.groynik@ef.uni-lj.siMojca Indihar Stembergermojca.stemberger@ef.uni-lj.siIn today’s global market the main focus of competition is not only between different companies but also between supply chains. Technological changes and organizational improvements are important for effective supply chain management (SCM), however, the main cause of SCM improvements is not the implementation of an information system (IS) itself, but rather a change and an integration of business processes. The paper summarizes the most important concepts of SCM and specifically concentrates on the importance of business process management (BPM) in supply chains, because full advantages can be realized when business processes in the supply chain are well defined, integrated and managed. The main purpose of this paper is to show that successful SCM calls for the maturity of supply chain processes in all involved companies and at the supply chain level, which can be realized by using effective BPM methods. A necessary condition for growing of SCM in terms of supply chain process maturity levels is an inter-organizational information system development and process renovation. Yet, BPM should not be considered as a one-time project of IS implementation and process change, but as a permanent process performance measurement, analysis and continuous improvement of the supply chain processes. The concepts are illustrated with a case study of fuel supply process.https://jios.foi.hr/index.php/jios/article/view/35AN AUTOMATIC AND METHODOLOGICAL APPROACH FOR ACCESSIBLE WEB APPLICATIONS2008-03-21T09:19:33+01:00Lourdes Morenolmoreno@inf.uc3m.esElena Castroecastro@inf.uc3m.esPaloma Martinezpmf@inf.uc3m.esSemantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies.https://jios.foi.hr/index.php/jios/article/view/136Cover pages2009-12-15T12:17:16+01:00Neven Vrčekneven.vrcek@foi.hrHere you can download journal cover pages.https://jios.foi.hr/index.php/jios/article/view/34WEATHER FORECAST DATA SEMANTIC ANALYSIS IN F-LOGIC2008-03-21T09:11:41+01:00Ana Meštrovićamestrovic@ffri.hrSanda Martinčić-Ipšićsmarti@ffri.hrMirko Čubrilomirko.cubrilo@foi.hrThis paper addresses the semantic analysis problem in a spoken dialog system developed for the domain of weather forecasts. The main goal of semantic analysis is to extract the meaning from the spoken utterances and to transform it into a domain database format. In this work a semantic database for the domain of weather forecasts is represented using the F-logic formalism. Semantic knowledge is captured through semantic categories a semantic dictionary using phrases and output templates. Procedures for semantic analysis of Croatian weather data combine parsing techniques for Croatian language and slot filling approach. Semantic analysis is conducted in three phases. In the first phase the main semantic category for the input utterance is determined. The lattices are used for hierarchical semantic relation representation and main category derivation. In the second phase semantic units are analyzed and knowledge slots in the database are filled. Since some slot values of input data are missing in the third phase, incomplete data is updated with missing values. All rules for semantic analysis are defined in the F-logic and implemented using the FLORA-2 system. The results of semantic analysis evaluation in terms of frame and slot error rates are presented.https://jios.foi.hr/index.php/jios/article/view/135From the Editor2009-12-15T12:17:16+01:00Neven Vrčekneven.vrcek@foi.hr<p>Dear readers,</p><p>I proudly welcome you to Issue 2 of Volume 33 of the Journal of Information and Organizational Sciences.</p><p>Let me remind you that JIOS is published on the two-issues-per-volume basis, with one volume published annually. One issue of the volume is usually dedicated to CECIIS, the international scientific conference organized and hosted by the Faculty of Organization and Informatics. These special issues of JIOS normally contain a selection of best scientific papers presented at the Conference. The second issue is reserved for scientific papers in the fields of information sciences as well as a range of scientific fields related with information sciences, particularly applied ICT in economics and business.</p><p>Owing to the efforts of the Editorial Board aimed at including JIOS in a number of relevant databases, JIOS has been steadily increasing its visibility with every new volume. As a result, JIOS is currently being cited in seven databases that cover a variety of scientific topics connected to information sciences, computing and applied ICT.</p><p>In this issue you will find a selection of several original scientific papers, two preliminary communications and one review paper. We hope that the variety of themes reflects some of your own research interests, thus making the papers inspirational for your future work.</p><p>As in all my letters addressed to the respected readership of JIOS, I would like to use this opportunity to motivate prospective authors among you, dear readers, to submit papers at www.jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Your willingness to become a peer-reviewer for submitted papers would be much appreciated as by choosing to do so you would contribute significantly to the rising quality of JIOS.</p>https://jios.foi.hr/index.php/jios/article/view/200From the Editor2011-06-27T10:15:52+02:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,<br />It is my pleasure to present you the 1st number of the 35th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 6 original scientific papers, 2 preliminary communications and 2 survey papers have been included, all of which have undergone a rigorous double-blind review process.</p><p>Some of the papers published here were already presented at the CECIIS 2010 Conference held in Varaždin between 22nd and 24th September 2010. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: databases, programming, IT supported learning, and other topics in the field of applied information sciences. We hope that the variety of themes will draw the attention of researchers in different ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a peer-reviewed for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in seven well known databases and now this number has risen to nine, adding “SCOPUS” and “Library, Information Science &amp; Technology Abstracts” to the database list. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p>https://jios.foi.hr/index.php/jios/article/view/25TOWARDS AN OPEN BIOMETRIC ONTOLOGY2008-03-18T14:27:34+01:00Miroslav Bačamiroslav.baca@foi.hrMarkus Schattenmarkus.schattenKornelije Rabuzinkornelije.rabuzin@foi.hrOver the last decade we faced a great number of publications in the field of biometrics. Many new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology. What some authors call a biometric method, others call model, system or even characteristic. There wasn't enough effort in creating a unique systematization and categorization which would approach the stated issues and open new areas of research. We argue that it is possible to approach biometrics in a narrower and in a broader perspective. We observed biometrics in the narrower perspecive and created a unique framework for the systematization and categorization of biometric methods, models, characteristics and patterns based on a general biometric system. This systematization is a fundamental step forward towards the creation of an open biometrics ontology.https://jios.foi.hr/index.php/jios/article/view/168Cover pages2010-06-30T15:40:32+02:00Neven Vrčekneven.vrcek@foi.hrHere you can download journal cover pages.https://jios.foi.hr/index.php/jios/article/view/16BUSINESS PROCESS MODELLING: A FOUNDATION FOR KNOWLEDGE MANAGEMENT2008-03-14T14:41:40+01:00Vesna Bosilj-Vukšićvbosilj@efzg.hrKnowledge management (KM) is increasingly recognised as a strategic practice of knowledge-intensive companies, becoming an integral part of an organisation's strategy to improve business performance. This paper provides an overview of business process modelling applications and analyses the relationship between business process modelling and knowledge management projects. It presents the case study of Croatian leading banks and the insurance company, discussing its practical experience in conducting business process modelling projects and investigating the opportunity for integrating business process repository and organisational knowledge as the foundation for knowledge management system development.https://jios.foi.hr/index.php/jios/article/view/7PRIORITISATION OF E-LEARNING FORMS BASED ON PAIR-WISE COMPARISONS2008-03-14T10:32:53+01:00Tihomir Hunjaktihomir.hunjak@foi.hrNina Begičevićnina.begicevic@foi.hrThere are different forms of teaching using ICT, and they differ according to the level of technological support, the role and tasks of the participants, the level of students’ participation, the physical location of the participants and their interaction. Distance learning is the common name for the process of obtaining knowledge and skills with the assistance of ICT and other forms of distance study. E-learning is a special form of such teaching. In terms of the teaching materials’ specific qualities, and the recommendation of teaching methods for successful teaching, there are different options for applying e-learning in teaching. E-learning can be used either as an independent form of teaching, or as a support to the already established systems of education, or even as their addition. The problem that is being solved in this paper is the prioritisation of e-learning forms for the specific teaching unit, subject, group of subjects, or the whole teaching programme. All this should be done regarding the context, which is characterised by the quality and innovative teaching, available professionals, equipment, possibility of students’ approach to technology, organization of teaching, and rules and regulations. This problem was solved with the assistance of AHP models developed in the process of group decision making supported by sw TeamEC2000.https://jios.foi.hr/index.php/jios/article/view/42IMPLEMENTATION OF ICT AND THE ISO 9001:2000 STANDARD CAN IMPROVE THE QUALITY OF STUDYING IN CROATIA2008-03-21T10:41:26+01:00Giorgio Sinkovićgiorgio.sinkovic@efpu.hrJusuf Šehanovićjusuf.sehanovic@veleri.hrThe process of integrating the Republic of Croatia in the EU calls for an adaptation and improvement of many of the Croatian society elements, among which there is also the education system as a foundation for creating of a generation who will, by their knowledge and a world view, easily embed into the European virtues. The conformation of the high education system has been consolidated under the term "the Bologna process". Although the basic accent of this process has been put to conformation in order to form a unique European education system, the efficiency of knowledge acquiring process within the sole endeavour to ensure the quality, also represents one of the main objectives. The article hereto points to the possible advantages of implementing the ICT and the international ISO 9000 standards as a base for an efficient increase of the quality of studying in the Republic of Croatia.https://jios.foi.hr/index.php/jios/article/view/10SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS2008-03-14T12:46:43+01:00Tonimir Kišasonditonimir.kisasondi@foi.hrAlen Lovrenčićalen.lovrencic@foi.hrIn this paper we present a modified neural network architecture and an algorithm that enables neural networks to learn vectors in accordance to user designed sequences or graph structures. This enables us to use the modified network algorithm to identify, generate or complete specified patterns that are learned in the training phase. The algorithm is based on the idea that neural networks in the human neurocortex represent a distributed memory of sequences that are stored in invariant hierarchical form with associative access. The algorithm was tested on our custom built simulator that supports the usage of our ADT neural network with standard backpropagation and our custom built training algorithms, and it proved to be useful and successful in modelling graphs.https://jios.foi.hr/index.php/jios/article/view/23FACTORS WHICH HAVE FATAL INFLUENCE ON ERP IMPLEMENTATION ON SLOVENIAN ORGANIZATIONS2008-03-14T15:45:19+01:00Simona SternadSimona.Sternad@uni-mb.siSamo BobekSamo.Bobek@uni-mb.siA lot of ERP implementations are failure, because organizations which bought ERP systems thought that this was all what they should do. But failure cases of ERP implementation showed, that organizations have to do extensive work on implementation. Because of that, organizations have to create conditions, in which they can implement chosen solution in expected time, scope and evaluated costs. That means that organizations should be aware of what most critical factors for success (CSF) in ERP implementations are. The high failure rate of ERP implementations call for better understanding of critical success factors (CSFs). In the paper we will research the CSFs in ERP implementation by studying published prior research on the field of ERP implementation. We will build a model of CSFs for ERP implementation, discuss in depth some most important factors and present preliminary results of importance CSFs of ERP implementation in Slovenian organizations.https://jios.foi.hr/index.php/jios/article/view/17RETHINKING OF ENTREPRENEURSHIP: TOWARDS SOCIAL RESPONSIBILITY2008-03-14T15:11:03+01:00Marina Klačmer Čalopamarina.klacmer@foi.hrMarijan Cingulamarijan.cingula@foi.hrSocial entrepreneurship is highlighted as a result of general entrepreneurship development because the traditional entrepreneurial factors are accomplished with the social aspects of common good. Entrepreneur's responsibility in choosing the main business activity within an industry increases if the way he conducts his activities is considered. Institutional support for social entrepreneurship is achieved by generating many business activities in order to fulfil different kinds of social needs. Social entrepreneurship is possible if both entrepreneur’s initiative and institutional support for small and medium sized enterprises (SME) are included in performing for traditionally non-profit activities. Allowing private initiative to fulfil the real needs of different users in social, educational, cultural and other non-profit fields is a good way to support SMEs. However, the institutional control should still remain in place in order to protect the minimum performing standards.The development of social entrepreneurship in transition countries is important for general economic development, but also for the supporting values of ethics in business activities.https://jios.foi.hr/index.php/jios/article/view/178From the Editor2010-12-14T10:52:05+01:00Neven Vrčekneven.vrcek@foi.hr<div>Dear authors, readers and future authors,</div><div><br /></div><div>I proudly introduce to you a new issue of JIOS, the Journal of Information and Organizational&nbsp;Sciences, volume 34, Issue 2. The Journal&rsquo;s primary goal is to present current research in the field of&nbsp;information and organizational sciences, as well as on theoretical developments in the fields that&nbsp;impact information, computer and organizational sciences.</div><div><br /></div><div>The importance of JIOS is rising and it is being increasingly seen as a relevant journal in the eld of&nbsp;information sciences and applied information and communication technology. Speaking in favour&nbsp;of this statement is the fact that JIOS has been included into two new databases: Scopus and EBSCO.&nbsp;We are particularly satised with the Journal&rsquo;s inclusion in Scopus since it is the largest abstract and&nbsp;citation database containing both peer-reviewed research literature and quality web sources.</div><div><br /></div><div>In this issue of JIOS a selection of four original scientic papers and one preliminary communication&nbsp;paper have been included that cover the following topics: approach to optical network design using a&nbsp;general heuristic optimization framework (Lackovic, M.), improving e-learning eciency, intelligence&nbsp;and adapted teaching materials (Kalpic, D. &amp; Zuc, J.), online privacy (Mekovec, R.) and social network&nbsp;analysis of Eureka project partnership in Central and South-Eastern European regions (Divjak, B.,&nbsp;Peharda P., Begicevic N.). We hope you will nd these papers interesting and challenging for your own&nbsp;research.</div><div><br /></div><div>I would hereby invite all the interested colleagues to submit a paper and hence contribute to the&nbsp;improvement and development of JIOS. You can submit your papers at jios.foi.hr, where you can&nbsp;also express your comments, recommendations or critical remarks regarding the papers published in&nbsp;previous issues.</div>https://jios.foi.hr/index.php/jios/article/view/40SUCCESS AND IMPACT FACTORS OF CARD-BASED LOYALTY SYSTEMS - AN EMPIRICAL ANALYSIS IN THE GERMAN RETAIL SECTOR2008-03-21T10:20:23+01:00Markus Ruchruch@iig.uni-freiburg.deThe retail sector in Germany has also been badly hit by intensifying international competition. Confronted with lowering margins and the movement of customers to the most favourable provider in each case, it became increasingly more difficult for companies to reach such goals as turnover and market share inputs. With the introduction of Card-based Loyalty Systems (CBLS), an instrument appears to have been found which increases customer retention through the evaluation of purchasing information and enables the companies to realize their goals even under difficult market conditions. The provision for this, however, is the permanent acceptance of the customer with regard to these systems.<br />This paper first gives an overview of the connections between CBLS and increased customer retention before their impact factors are empirically analyzed for consumer utility. If these factors flow into a cost-benefit analysis, it appears that privacy of the consumers is endangered in the long term and an added value and consequently the preconditional permanent acceptance of the customer is not necessarily given. The resulting question ";Why do customers make use of CBLS anyway?"; can be answered using the approach of hyperbolic utility-discounting.https://jios.foi.hr/index.php/jios/article/view/22HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT2008-03-14T15:39:58+01:00Mario Sajkomario.sajko@foi.hrKornelije Rabuzinkornelije.rabuzin@foi.hrMiroslav Bačamiroslav.baca@foi.hrThe actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities of business information values, and the criteria needed for determining importance of information. For this purpose, the dimensions of information values will be determined and the ways used to present the importance of information contents will be studied. There are two basic approaches that can be used in evaluation: qualitative and quantitative. Often they are combined to determine forms of information content. The proposed criterion is the three-dimension model, which combines the existing experiences (i.e. possible solutions for information value assessment) with our own criteria. An attempt for structuring information value in a business environment will be made as well.https://jios.foi.hr/index.php/jios/article/view/37SOME APPROACHES TO TEXT MINING AND THEIR POTENTIAL FOR SEMANTIC WEB APPLICATIONS2008-03-21T09:37:29+01:00Jan Paraličjan.paralic@tuke.skMarek Paraličmarek.paralic@tuke.skIn this paper we describe some approaches to text mining, which are supported by an original software system developed in Java for support of information retrieval and text mining (JBowl), as well as its possible use in a distributed environment. The system JBowl1 is being developed as an open source software with the intention to provide an easily extensible, modular framework for pre-processing, indexing and further exploration of large text collections. The overall architecture of the system is described, followed by some typical use case scenarios, which have been used in some previous projects. Then, basic principles and technologies used for service-oriented computing, web services and semantic web services are presented. We further discuss how the JBowl system can be adopted into a distributed environment via technologies available already and what benefits can bring such an adaptation. This is in particular important in the context of a new integrated EU-funded project KP-Lab2 (Knowledge Practices Laboratory) that is briefly presented as well as the role of the proposed text mining services, which are currently being designed and developed there.https://jios.foi.hr/index.php/jios/article/view/38DEVELOPING SYSTEM DYNAMICS MODELS WITH "STEP-BY-STEP" APPROACH2008-03-21T15:57:14+01:00Mirjana Pejić-Bachmpejic@efzg.hrVlatko Čerićvceric@efzg.hrSystem dynamics is a powerful tool that enhances learning about company, market and competitors; portrays the cognitive limitations on the information gathering and processing power of human mind; facilitates the practice of considering opinions; and supports building of ";What if"; scenarios. Although the literature on system dynamics modeling is very rich with applications in many fields, not many papers on developing system dynamics models were published so far. In this paper we portray current approaches to the development of system dynamics models. These are (1) model development based on influence diagram, (2) model development based on the identification of resources and their states, (3) usage of generic structures for specific domain field, and (4) component strategy for the formulation of system dynamics models. Validation is an important issue that none of these approaches tackles. We propose a ";step-by-step"; approach that integrates validation with developing process of system dynamics models. This approach will be demonstrated on the example of development of a simple inventory model.https://jios.foi.hr/index.php/jios/article/view/41DECISION SUPPORT SYSTEM TO SUPPORT DECISION PROCESSES WITH DATA MINING2008-03-21T10:34:35+01:00Rok Rupnikrok.rupnik@fri.uni-lj.siMatjaž Kukarmatjaz.kukar@fri.uni-lj.siTraditional techniques of data analysis do not enable the solution of all kind of problems and for that reason they have become insufficient. This caused a newinterdisciplinary field of data mining to arise, encompassing both classical statistical, and modern machine learning techniques to support the data analysis and knowledge discovery from data. Data mining methods are powerful in dealing with large quantities of data, but on the other hand they are difficult to master by business users to facilitate decision support. In this paper we introduce our approach to integration of decision support system with data mining. We discuss the role of data mining to facilitate decision support, the use of data mining methods in decision support systems, discuss applied approaches and introduce a data mining decision support system called DMDSS - Data Mining Decision Support System. We also present some obtained results and plans for future development.https://jios.foi.hr/index.php/jios/article/view/29INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS2008-03-18T15:27:08+01:00Sandro Gerićsandro.geric@foi.hrŽeljko Hutinskizeljko.hutinski@foi.hrInformation systems are exposed to different types of security risks. Theconsequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats) classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications.https://jios.foi.hr/index.php/jios/article/view/13IMPROVED VIRTUAL CIRCUIT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKS UNDER THE ASPECT OF POWER AWARENESS2008-03-14T13:30:11+01:00Abid Ali Minhasminhas@iti.tu-graz.ac.atThomas Trathniggthomas.trathnigg@tugraz.atChristian Stegersteger@iti.tu-graz.ac.atReinhold Weißrweiss@iti.tu-graz.ac.atRouting algorithms have shown their importance in the power aware wireless micro-sensor networks. In this paper first we present virtual circuit algorithm (VCRA), a routing algorithm for wireless sensor networks. We analyze the power utilized by nodes to lengthen the battery life and thus improving the lifetime of wireless sensor network. We discuss VCRA in comparison with the Multihoprouter, an algorithm developed by UC Berkeley. Then we present Improved Virtual Circuit Routing Algorithm (IVCRA) which is an improved form of VCRA. In IVCRA node failure detection and path repairing scheme has been implemented. We also present the energy analysis of IVCRA and prove that IVCRA is the best choice. We first implement our routing algorithms in simulator TOSSIM and then on real hardware of mica2 mote-sensor network platform and prove the reliable routing of the data packets from different nodes to the base station. The motes used as nodes in our mote-sensor network are from Berkeley USA. By using simulator POWERTOSSIM, we estimate and present the energy utilized by different nodes of the network. At the end we present a comparison of our work with the network layer of Zigbee/IEEE 802.15.4, which is an emerging standard for wireless sensor networks and then compare its energy efficiency with the packet size chosen for our algorithm.https://jios.foi.hr/index.php/jios/article/view/27LEARNING PHENOMENA IN MANUFACTURING AND ARTIFICIAL NEURAL NETWORK2008-03-18T15:10:38+01:00Miroslav Carmiroslav.car@fsb.hrIn the industrially advanced countries, that are different from our ex and present countries, to learning phenomena has been dedicated a significant attention for the last 60 years. One of more basic reasons is multiple purposes of results. Until now, there have been applied various approaches, methods and procedures for empirical data approximation, and in this articles some possibilities of artificial neural network application are researched.https://jios.foi.hr/index.php/jios/article/view/19FORMAL MODELLING OF BUSINESS RULES: WHAT KIND OF TOOL TO USE?2008-03-14T15:26:33+01:00Sandra Lovrenčićsandra.lovrencic@foi.hrKornelije Rabuzinkornelije.rabuzin@foi.hrRuben Picekruben.picek@foi.hrBusiness rules are today essential parts of a business system model. But presently, there are still various approaches to, definitions and classifications of this concept. Similarly, there are also different approaches in business rules formalization and implementation. This paper investigates formalization using formal language in association with easy domain modelling. Two of the tools that enable such approach are described and compared according to several factors. They represent ontology modelling and UML, nowadays widely used standard for object-oriented modelling. A simple example is also presented.https://jios.foi.hr/index.php/jios/article/view/15VALIDATION OF THEORETICAL MODEL FOR DECISION MAKING ABOUT E-LEARNING IMPLEMENTATION2008-03-14T14:38:46+01:00Nina Begičevićnina.begicevic@foi.hrBlaženka Divjakblazenka.divjak@foi.hrIn the paper the possibility to use mathematical models and statistical techniques in strategic planning and decision making about e-learning is presented. Strategic planning and decision making has been covered as consisting of four phases: (1) intelligence, (2) design, (3) choice and (4) implementation. Each of the phases will be described in this paper, but the accent will be put on the statistical evaluation of the results of the questionnaire which was based on the developed theoretical model for decision making about e-learning implementation in the higher education sector. In general, the main objectives of this paper are: (1) validation of the first theoretical model for decision making about e-learning implementation in the higher education sector, by means of factor analysis and (2) reduction of a large number of variables to a smaller number of factors, i.e. designing the improved theoretical model, for modelling purposes (developing AHP & ANP models).https://jios.foi.hr/index.php/jios/article/view/119From the Editor2009-07-06T09:32:30+02:00Neven Vrcekneven.vrcek@foi.hr<p>Dear readers,</p><p>I am happy&nbsp; to present you a new&nbsp; issue of&nbsp; the Journal of&nbsp; Information and Organizational Sciences, volume 33, number 1.<br /><br />JIOS is being increasingly seen as a relevant journal in the field of information sciences and applied information and communication technology. Speaking in favour of this statement is the fact that JIOS has been&nbsp; included&nbsp; into several new databases &ndash; DOAJ (Directory of Open Access Journals), OAIster and Referativny Žurnal &ndash; which is information of interest to all our future authors. At present, we are cited in 7 diferent databases, which signifcantly enhances the visibility of the Journal. <br /><br />In&nbsp; this&nbsp; issue a&nbsp; selection of 9 original&nbsp; scientific papers, 3 preliminary communication articles and 1 review paper has been&nbsp; included, all of which have undergone rigorous double-blind review. Some of the papers published here were already presented at the CECIIS 2008 conference. The papers&nbsp; in the current&nbsp; issue cover a broad area of topics, from programming and web related topics, through algorithm and method proposals,&nbsp; to economics and applied&nbsp; linguistics. We hope you will find the papers interesting and challenging for your own research. <br /><br />We encourage you to submit your papers at www.jios.foi.hr, where you can also share with us your <br />recommendations, comments or critical remarks regarding the papers published in previous issues. <br />Your&nbsp; papers&nbsp; and&nbsp; feedback may&nbsp; prove&nbsp; invaluable&nbsp; in&nbsp; fulfilling&nbsp; our&nbsp; ambitions, which&nbsp; are&nbsp; very&nbsp; high indeed, as we have set out to enter some new databases. We would also appreciate your willingness to become a peer-reviewer for submitted papers, and thus give your contribution to the rising quality of JIOS.</p>https://jios.foi.hr/index.php/jios/article/view/43PROACTIVE APPROACH TO THE INCIDENT AND PROBLEM MANAGEMENT IN COMMUNICATION NETWORKS2008-03-21T10:50:05+01:00Vjeran Strahonjavjeran.starhonja@foi.hrKristijan Saletovićkristian.saletovic@siemens.comProactive approach to communication network maintenance has the capability of enhancing the integrity and reliability of communication networks, as well as of reducing maintenance costs and overall number of incidents. This paper presents approaches to problem and incident prevention with the help of root-cause analysis, aligning that with the goal to foresee software performance. Implementation of proactive approach requires recognition of enterprise's current level of maintenance better insights into available approaches and tools, as well as their comparison, interoperability, integration and further development. The approach we are proposing and elaborating in this paper lies on the construction of a metamodel of the problem management of information technology, particularly the proactive problem management. The metamodel is derived from the original ITIL specification and presented in an object-oriented fashion by using structure (class) diagrams conform to UML notation. Based on current research, appropriate metrics based on the concept of Key Performance Indicators is suggested.https://jios.foi.hr/index.php/jios/article/view/120Cover Pages2009-07-06T09:32:30+02:00Neven Vrcekneven.vrcek@foi.hrHere you can download journal cover pages.https://jios.foi.hr/index.php/jios/article/view/12EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES2008-03-14T12:55:40+01:00Melita Kozinamelita.kozina@foi.hrThe significance of integral business systems based on closer alignment of information technology to business processes has grown over the last ten years. Comprehensive business frameworks are necessary to capture the entire complexity of such systems. These frameworks called enterprise architectures can provide the conceptual foundation necessary for building and managing the integral business system and all its components. The goal of this paper was to analyze the Architecture of Integrated Information Systems (ARIS) and the Zachman frameworks, to define the criteria for comparison and evaluation of these approaches, and determine their level of complement. Furthermore, the contents of the paper define the generic model of business system management supported by said concepts (frameworks) and analyzes their orientation towards value.https://jios.foi.hr/index.php/jios/article/view/73From the Editor2008-07-17T09:46:14+02:00Neven Vrčekneven.vrcek@foi.hrThe Journal of Information and Organizational Sciences – JIOS – is an interdisciplinary scientific journal with focus on application of information sciences and advances in organizational sciences, as well as on theoretical contemplations in the fields that impact information sciences, computer sciences and organizational sciences. JIOS is published twice a year. This issue comprises submitted papers along with those chosen among papers presented at the IIS 2007 Conference (recently renamed CECIIS) organized by the Faculty of Organization and Informatics.<br />JIOS has already undergone several changes of its name and layout. With this issue we introduce a new visual identity of the Journal as well as modified instructions to authors, to make it more aligned with contemporary standards in scientific journal publication. Further, the Journal has changed its web address and is managed by Open Journal System, where all communication from submitting the paper to reviewing and publishing is conducted on-line.<br />In this issue of JIOS a selection of six original scientific papers has been included covering the following topics: organizational design, digital divide in enterprises, management software and web portals evaluation, m-marketing and m-advertising, as well as the introduction of a shot boundary detection algorithm for soccer video. We hope you will find the papers interesting and challenging for your own research.<br />We are looking forward to new papers to be submitted in the future and comments of papers already published.https://jios.foi.hr/index.php/jios/article/view/31FABASOFT BEST PRACTICES AND TEST METRICS MODEL2008-03-18T15:42:32+01:00Nadica HrgarekNadica.Hrgarek@fabasoft.comSoftware companies have to face serious problems about how to measure the progress of test activities and quality of software products in order to estimate test completion criteria, and if the shipment milestone will be reached on time. Measurement is a key activity in testing life cycle and requires established, managed and well documented test process, defined software quality attributes, quantitative measures, and using of test management and bug tracking tools. Test metrics are a subset of software metrics (product metrics, process metrics) and enable the measurement and quality improvement of test process and/or software product. The goal of this paper is to briefly present Fabasoft best practices and lessons learned during functional and system testing of big complex software products, and to describe a simple test metrics model applied to the software test process with the purpose to better control software projects, measure and increase software quality.https://jios.foi.hr/index.php/jios/article/view/24MODEL-BASED VALIDATION AND VERIFICATION OF ANOMALIES IN LEGISLATION2008-03-14T15:48:58+01:00Vjeran Strahonjavjeran.strahonja@foi.hrAn anomaly in legislation is absence of completeness, consistency and other desirable properties, caused by different semantic, syntactic or pragmatic reasons. In general, the detection of anomalies in legislation comprises validation and verification. The basic idea of research, as presented in this paper, is modelling legislation by capturing domain knowledge of legislation and specifying it in a generic way by using commonly agreed and understandable modelling concepts of the Unified Modelling Language (UML). Models of legislation enable to understand the system better, support the detection of anomalies and help to improve the quality of legislation by validation and verification. By implementing model-based approach, the object of validation and verification moves from legislation to its model. The business domain of legislation has two distinct aspects: a structural or static aspect (functionality, business data etc.), and a behavioural or dynamic part (states, transitions, activities, sequences etc.). Because anomalism can occur on two different levels, on the level of a model, or on the level of legislation itself, a framework for validation and verification of legal regulation and its model is discussed. The presented framework includes some significant types of semantic and syntactic anomalies. Some ideas for assessment of pragmatic anomalies of models were found in the field of software quality metrics. Thus pragmatic features and attributes can be determined that could be relevant for evaluation purposes of models. Based on analogue standards for the evaluation of software, a qualitative and quantitative scale can be applied to determine the value of some feature for a specific model.https://jios.foi.hr/index.php/jios/article/view/20REASONING ABOUT THE GAME „CLUE“ BY USING OTTER2008-03-14T15:29:47+01:00Marko Malikovićmalikovic_marko@yahoo.comIn this article the possibilities of reasoning about the card version of the game Clue by using OTTER - system for automatic theorem proving have been presented. The game Clue, as game based on knowledge have been modelled by PVETO logic - propositional multi-modal epistemic logic with temporal parameter adapted for reasoning with OTTER. PVETO logic is an extension of S5m logic and it’s most important characteristics are the introduction of special derivation predicates for every participant in the card game and introduction of temporal parameter. Temporal parameter refers to the moment of time in which we follow the truthfulness of the epistemic formulae.https://jios.foi.hr/index.php/jios/article/view/972Cover pages2015-07-06T16:01:16+02:00Alen Lovrenčićalen.lovrencic@foi.hr<span>Here you can download journal cover pages.</span>2015-07-06T16:00:38+02:00https://jios.foi.hr/index.php/jios/article/view/971From the Editor2015-07-06T16:01:16+02:00Alen Lovrenčićalen.lovrencic@foi.hr<p>Dear authors, reviewers and readers,</p><p><br />I am proud to introduce to you 39 (1) issue of the Journal of Information and Organizational Sciences. <br />I would like to thank all authors and reviewers for their efforts that make this issue possible to be published.</p><p>In this issue, you will find seven papers of respectable quality: five original scientific papers and two survey papers. The papers in this issue really affirm that this journal covers wide field of themes in information and organizational sciences from the neural networks and algorithms, through the knowledge management to the usage of ICT in the business.</p><p>Therefore, I hope that every reader will be able to find some paper that is interesting to him or her and close to the research field of his or her interest.</p><p>I wish you a pleasant reading.</p><p><br />Alen Lovrenčić<br />Editor</p>2015-07-06T15:59:08+02:00https://jios.foi.hr/index.php/jios/article/view/949A Study on Knowledge Gain and Retention when Using Multimedia Learning Materials of Different Quality2015-07-06T16:01:17+02:00Maja Gligora Markovićmgligoram@veleri.hrDijana Plantak Vukovacdijana.plantak@foi.hrBožidar Kličekbozidar.klicek@foi.hr<p class="Abstract">The usage of multimedia has proven to foster meaningful learning, but not every multimedia resource will necessarily contribute to the teaching-learning process. Since for the development of multimedia learning materials (MLMs) additional time and effort is required for everyone involved in the development process to pay proper attention to its quality in order to achieve desired learning effects. The paper deals with issues regarding the quality of multimedia learning materials (MLMs) as well as the relationship between MLM quality and knowledge retention. </p>The results of an experimental study that involves low-quality and high-quality MLMs for two different topics and their effects on knowledge gain and retention of the polytechnic school students are presented. For the purpose of the research the LORI assessment tool was used to evaluate the quality of MLMs. The analysis of research data shows that MLMs developed according to the principles of multimedia learning and principles for reducing cognitive load were perceived as being of higher quality than those that were not developed using multimedia principles. Furthermore, the students’ usage of high-quality MLMs during treatment resulted in better knowledge acquisition and retention indicated by significantly higher scores in the three knowledge assessments.2015-07-06T09:24:12+02:00https://jios.foi.hr/index.php/jios/article/view/948Measuring Public Procurement for Innovation on the Country Level and the Role of ICT Support2015-07-06T16:01:16+02:00Kristina Deteljkristina.detelj@foi.hrTanja Markovič Hriberniktanja.markovic@uni-mb.siIgor Pihirigor.pihir@foi.hr<p class="BodyUndented">Using of public procurement as a tool for promoting innovations has captured interest of many researchers in recent years. However, most of the research is focused on the impact of public procurement on the company's innovativeness. The article discusses the findings of the literature on this topic and proposes a model on how to transfer the concept from the company level to the level of the whole country. One of the biggest problems is unavailability of appropriate measures of this phenomenon, so the authors suggest that the concept of Public procurement for innovation can be approximated by participation of criterion of the most economically advantageous tender (MEAT). Implementation of this criterion in choosing the best offer can be supported and facilitated by using of ICT which can improve the efficiency of procurement process and enable more innovations.</p>2015-07-06T09:24:07+02:00https://jios.foi.hr/index.php/jios/article/view/942Methods and Algorythms of Alternatives Ranging in Managing the Telecommunication Services Guality.2015-07-06T16:01:18+02:00Pham Quang Hiepphamhiephd@gmail.comKvyatkovskaya Irina Yurievnai.kvyatkovskaya@astu.orgShurshev Valery Fedorovichv.shurshev@mail.ruPopov Georgy Alexandrovichpopov@astu.org<p>The article deals with methods of solving the problem of ranging of alternatives in information-analytical system of managing the quality of telecommunication services rendering process. Tasks of choice are determined, in which the alternatives are as follows: states of quality of different objects in the structure of telecommunication company management. An algorithm of ranging of objects is elaborated for the case of using unstructured set of indices. The algorithm enables to determine the objects priorities and to select the best ones among them. The suggested methods may be used while elaborating the programs of improvement of telecommunication companies competitiveness.</p>2015-07-06T09:24:00+02:00https://jios.foi.hr/index.php/jios/article/view/941Boosting Ensembles of Heavy Two-Layer Perceptrons for Increasing Classification Accuracy in Recognizing Shifted-Turned-Scaled Flat Images with Binary Features2015-07-06T16:01:18+02:00Vadim V. Romanukeromanukevadimv@mail.ruA method of constructing boosting ensembles of heavy two-layer perceptrons is stated. The benchmark classification problem is recognition of shifted-turned-scaled flat images of a medium format with binary features. The boosting gain is suggested in two aspects. The earliest one is the ratio of minimal recognition error percentage among the ensemble perceptrons to the recognition error percentage performed by the ensemble. The second gain type is the ratio of minimal variance of perceptrons’ recognition error percentages over 26 classes to variance of the ensemble’s recognition error percentages over 26 classes. Both ratios increase as the number of perceptron classifiers in the ensemble increase. The ensemble of 36 classifiers performs with increased accuracy, where recognition error percentage is decreased for 33 %, and the variance is decreased for more than 50 %. Further increment of classifiers into ensemble cannot increase accuracy much as there is the saturation effect of the boosting gain. And the gain itself depends on the range of noise modeling object’s distortions. Thus, the heavier perceptron classifier the less gain is expected.2015-07-06T09:23:54+02:00https://jios.foi.hr/index.php/jios/article/view/938An Overview of Graph-Based Keyword Extraction Methods and Approaches2015-07-06T16:01:16+02:00Slobodan Beligasbeliga@inf.uniri.hrAna Meštrovićamestrovic@inf.uniri.hrSanda Martinčić-Ipšićsmarti@inf.uniri.hr<p class="Abstract">The paper surveys methods and approaches for the task of keyword extraction. The systematic review of methods was gathered which resulted in a comprehensive review of existing approaches. Work related to keyword extraction is elaborated for supervised and unsupervised methods, with a special emphasis on graph-based methods. Various graph-based methods are analyzed and compared. The paper provides guidelines for future research plans and encourages the development of new graph-based approaches for keyword extraction.</p>2015-07-06T09:23:47+02:00https://jios.foi.hr/index.php/jios/article/view/918Awareness of Cloud Computing in Slovenian and Croatian Micro-Enterprises2015-07-06T16:01:19+02:00Borut Werberborut-werber@fov.uni-mb.siMarina Klačmer Čalopamarina.klacmer@foi.hrIgor Pihirigor.pihir@foi.hrAnja Žnidaršičanja.znidarsic@fov.uni-mb.si<p><span style="font-family: Times New Roman; font-size: small;">This paper presents a comparison of the two studies conducted in Slovenian and Croatian micro-enterprises (µE) about the awareness of the cloud computing (CC). We were interested in the issues relating to the characteristics of µE and the latter's use of information and communication technology (ICT) in business processes. Also, the characteristics of owners and µE were investigated. We found that the results obtained in the two countries were similar. In both cases, the most important CC characteristics were reliability, security and performance. Given that CC could represent a good business opportunity for µE, some managerial implications are proposed.</span></p>2015-07-06T09:23:40+02:00https://jios.foi.hr/index.php/jios/article/view/913Evaluating Expert Estimators Based on Elicited Competences2015-07-06T16:01:17+02:00Hrvoje Karnahkarna@fesb.hrSven Gotovacgotovac@fesb.hrUtilization of expert effort estimation approach shows promising results when it is applied to software development process. It is based on judgment and decision making process and due to comparative advantages extensively used especially in situations when classic models cannot be accounted for. This becomes even more accentuated in today’s highly dynamical project environment. Confronted with these facts companies are placing ever greater focus on their employees, specifically on their competences. Competences are defined as knowledge, skills and abilities required to perform job assignments. During effort estimation process different underlying expert competences influence the outcome i.e. judgments they express. Special problem here is the elicitation, from an input collection, of those competences that are responsible for accurate estimates. Based on these findings different measures can be taken to enhance estimation process. The approach used in study presented in this paper was targeted at elicitation of expert estimator competences responsible for production of accurate estimates. Based on individual competences scores resulting from performed modeling experts were ranked using weighted scoring method and their performance evaluated. Results confirm that experts with higher scores in competences identified by applied models in general exhibit higher accuracy during estimation process. For the purpose of modeling data mining methods were used, specifically the multilayer perceptron neural network and the classification and regression decision tree algorithms. Among other, applied methods are suitable for the purpose of elicitation as in a sense they mimic the ways human brains operate. Data used in the study was collected from real projects in the company specialized for development of IT solutions in telecom domain. The proposed model, applied methodology for elicitation of expert competences and obtained results give evidence that in future such a model can be used in practice to reduce estimation error and enhance expert effort estimation.2015-07-06T09:23:28+02:00https://jios.foi.hr/index.php/jios/article/view/925Cover pages2014-12-16T13:43:46+01:00Alen Lovrenčićalen.lovrencic@foi.hrHere you can download journal cover pages.2014-12-16T13:43:07+01:00https://jios.foi.hr/index.php/jios/article/view/924From the Editor2014-12-16T13:43:45+01:00Alen Lovrenčićalen.lovrencic@foi.hr<p>Dear authors, readers and reviewers, ladies and gentlemen.</p><p>We present second number of the 38th volume of the Journal of Information and Organizational Sciences. We are continuing to publish papers from the wide scope of information and organizational sciences from the computer science to the organizational systems.</p><p>As a new JIOS editor I would like to introduce myself thank to the former editor prof. Neven Vrček not only for the help in my first JIOS issue, but for all things he did for JIOS while he was in charge. I really think that JIOS as it is today is mostly his credit, as anyone who compare the journal today and before his mandate can easily see. He improved JIOS in every sense, in international recognition, quality of papers, and technical design. I can only hope that I will be as succesful as he was and that I will develop as good relationship with authors, reviewers, editorial and publishing board as he had. I am inviting you all to read, write and participate in JIOS in the future as well as you did in the past.</p><p>In this issue we are proud to present six papers, four original scientific papers, one survey paper and one preliminary communication to you. I really hope you will enjoy in reading this issue of JIOS and that you will find the papers in it interesting and useful.</p>2014-12-16T12:49:53+01:00https://jios.foi.hr/index.php/jios/article/view/916A Case Study of Software Product Line for Business Applications Changeability Prediction2014-12-16T13:43:49+01:00Zdravko Roškozrosko@gmail.comVjeran Strahonjavjeran.strahonja@foi.hr<p class="Abstract"><span lang="EN-US">The changeability, a sub-characteristic of maintainability, refers to the level of effort which is required to do modifications to a software product line (SPL) application component. Assuming dependencies between SPL application components and reference architecture implementation (a platform), this paper empirically investigates the relationship between 7 design metrics and changeability of 46 server components of a product line for business applications. In addition, we investigated the usefulness of Platform Responsibility (PR) metric as an indicator of product line component changeability. The results show that most of the design metrics are strongly related to the changeability of server component and also indicate statistically significant correlation between Maintainability Index (MI) and PR metric. The assessment is based on a case study of the implementation of the product line for business applications in a financial institution. The results show that PR metric can be used as good predictor of changeability in the software product line environment. </span></p><p class="Abstract"> </p>2014-12-16T12:45:34+01:00https://jios.foi.hr/index.php/jios/article/view/914Applying Genetic Algorithms and RIA technologies to the development of Complex-VRP Tools in real-world distribution of petroleum products2014-12-16T13:43:48+01:00Antonio Moratilla Ocañaantonio.moratilla@uah.esEugenio Fernández Vicenteeugenioj.fernandez@uah.esJosé Ignacio Olmeda Martosjosei.olmeda@uah.esJuan José Sánchez Peñajuanjo.sanchez@uah.esAlberto Moratilla Ocañaalberto.moratilla@uah.es<p class="Abstract"><span lang="EN-US">Distribution problems had held a large body of research and development covering the VRP problem and its multiple characteristics, but few investigations examine it as an Information System, and far fewer as how it should be addressed from a development and implementation point of view. This paper describes the characteristics of a real information system for fuel distribution problems at country scale, joining the VRP research and development work using Genetic Algorithms, with the design of a Web based Information System. In this paper a view of traditional workflow in this area is shown, with a new approximation in which is based proposed system. Taking into account all constraint in the field, the authors have developed a VRP</span><span lang="EN-US">Web-based solution using Genetic Algorithms with multiple web frameworks for each architecture layer, focusing on functionality and usability, in order to minimizing human error and maximizing productivity. To achieve these goals, authors have use SmartGWT as a powerful Web based RIA SPA framework with java integration, and multiple server frameworks and OSS based solutions,</span><span class="hps"><span lang="EN">applied to </span></span><span lang="EN-US">development of a very complex VRP system for a logistics operator </span><span class="hps"><span lang="EN">of</span></span><span lang="EN"> <span class="hps">petroleum products.</span></span></p>2014-12-16T12:45:25+01:00https://jios.foi.hr/index.php/jios/article/view/906An approach to source code conversion of classical programming languages into source code of quantum programming languages2014-12-16T13:43:46+01:00Alan Bojićabojic@foi.hrBasic principles of quantum computer ensure more computing power than the principles of classical computers. Quantum computers use quantum mechanical effects such as entanglement and superposition to speed up computing processes compared to classical computers. If the quantum computers one day becomes a commercially available product, then it is very important to have a converter that will convert the source code of programming languages for classical computers into source code of programming languages for quantum computers because it will speed up the translation process and ensure that developers of classical computers can develop programs for quantum computer using programming languages for classical computers. In this paper, the basic approach to automatic conversion of the source code for classical computer into a source code of quantum computer is introduced.2014-12-16T12:45:09+01:00https://jios.foi.hr/index.php/jios/article/view/899Analysis of human resources in science and technology in ICT companies–case of Croatia2014-12-16T13:43:47+01:00Jelena Horvatjelena.horvat@foi.hrMarina Klačmer Čalopamarina.klacmer@foi.hrAleksandra Sobodićaleksandra.sobodic@foi.hr<p class="Abstract">This paper integrates theories and findings of the level of tertiary educated workforce, the human resources in science and technology and skills that are desirable in employees from in the information and communication technologies (ICT) sector. It is important to examine the real situation on the labor market in the ICT sector, which is often referred to as the key to overcoming the crisis and the future of national economy. Basic statistical elements, upon which to predict future demand for human resources in science and technology (HRST), are people who enter tertiary level of education (inputs) or are already in the system (throughputs), but until graduation are not considered HRST’s (outputs). Analysis is based on a sample of 56 small companies in ICT sector in Croatia. This paper presents the overview of the situations of human resources in small companies ICT sector in Croatia. Existing literature on HRST, employee’s skills and ICT sector is reviewed in the light of this analysis, in order to better understand current employment structure and desirable competencies of future employees of small companies in the ICT sector in Croatia.</p>2014-12-16T12:44:47+01:00https://jios.foi.hr/index.php/jios/article/view/897Approximation of unit-hypercubic infinite antagonistic game via dimension-dependent irregular samplings and reshaping the payoffs into flat matrix wherewith to solve the matrix game2014-12-16T14:51:42+01:00Vadim Romanukeromanukevadimv@mail.ruThere is suggested a method of approximating unit-hypercubic infinite antagonistic game with the matrix game and the corresponding solution in finite strategies. The method is based on dimension-dependent irregular samplings over the game kernel. Numbers of the sampling points and their coordinates are chosen due to the stated conditions. If the sampled kernel is not the flat matrix them the multidimensional payoff matrix is reshaped into the flat one wherewith to solve the matrix game. The reshaping is a reversible matrix map. The concluding step of the approximation is in checking the finite solution consistency. Consistency can be weakened, and consistency can be checked at some rank corresponding to a natural number. The higher rank of the finite solution consistency is, the wider neighborhood of the sampling numbers at which the solution properties are monotonic-like.2014-12-16T12:44:23+01:00https://jios.foi.hr/index.php/jios/article/view/892Technical, Legal, Economic and Social Aspects of Biometrics for Cloud Computing2014-12-16T13:43:46+01:00Jernej Bulejernej.bule@fri.uni-lj.siPeter Peerpeter.peer@fri.uni-lj.si<p class="Abstract">This article addresses technical, legal, economic and social aspects of biometrics for cloud computing, featuring application example, gains of such solution, current laws, directives and legislation for biometrics and cloud computing. It is primarily based on Slovenian example due to common general EU legislation in the field of cloud computing and biometrics. Authentication on the Internet is still mainly done using passwords, while biometrics is practically not used. It is commonly known that everything is moving to the cloud and biometrics is not an exception. Amount of biometric data is expected to grow significantly over the next few years and only cloud computing is possible to process such amounts of data. Due to these facts and increasing security needs, we propose and implement the use of biometry as a service in the cloud. A challenge regarding the use of biometric solutions in the cloud is the protection of the privacy of individuals and their personal data. In Slovenia privacy legislation is very strong, it permits usage of biometrics only for very specific reasons, but we predict that big players on the market will change this fact globally. One of the important reasons for that is also the fact that biometrics for cloud computing provides some strong benefits and economic incentives. Proper deployment can provide significant savings. Such solutions could improve people’s quality of life in terms of social development, especially in sense of more convenient, safer and reliable identification over multiple government and non-government services.</p>2014-12-16T12:44:14+01:00https://jios.foi.hr/index.php/jios/article/view/902Cover pages2014-06-26T15:40:21+02:00Neven Vrčekneven.vrcek@foi.hr<span>Here you can download journal cover pages.</span>2014-06-26T15:39:55+02:00https://jios.foi.hr/index.php/jios/article/view/901From the Editor2014-06-26T15:40:21+02:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,</p><p>it is my pleasure to present you the 1st number of the 38th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>Please allow me one personal note. This is my last issue as an editor. I started in 2008. and it is time to make some changes. I’ll continue to act as a member of editorial board but I am handling over my editorial duty to new editor Alen Lovrenčić. It was pleasure to work with all authors, reviewers and collaborators and please continue partnership with JIOS because we have high aims which cannot be achieved without dedicated scientific community. I would also like to thank the publishing team of JIOS who helped with many operational issues especially: Bernarda Kos, Goran Hajdin and Darko Grabar.<br /> <br />In this issue a selection of 3 original scientific papers, 1 survey paper and 1 preliminary communications has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>The constant mission of JIOS is to cover scientific publications from broad area of information sciences and related disciplines and we continuously receive many articles in which authors strive to achieve scientific merit. Our review procedure is very strict but even when we decline papers we try to encourage authors in their future work and motivate them to give better results. That is why we maintain very good relations with our authors and we invite all of you to extend cooperation with JIOS.</p><p>We hope that the variety of themes will draw the attention of researchers in different fields of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue our work of delivering research results to interested audience. The ICT field is changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions and all related project lines. That is why we encourage and promote scientific collaboration across scientific areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulfill our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in ten well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p><p>So please be with us in the future, support new editorial team and help us build JIOS together.</p><p>Neven Vrček<br />Editor</p>2014-06-26T14:21:22+02:00https://jios.foi.hr/index.php/jios/article/view/848Biometric System Vulnerability as a Compromising Factor for Integrity of Chain of Custody and Admissibility of Digital Evidence in Court of Justice: Analysis and Improvement Proposal2014-06-27T15:46:47+02:00Zoran Cosiczoran.cosic@statheros.hrJasmin Ćosićjascosic@bih.net.baMiroslav Bačamiroslav.baca@foi.hr<p>Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric traits and possible suspect. Thus it is important that biometric systems can be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as energy plants, access to borders at airports, ecommerce etc. Biometric recognition either raises important legal issues of remediation, authority, and reliability, and, of course, privacy. The standard assumptions of the technologists who design new techniques, capabilities, and systems are very different from those embedded in the legal system. Legal precedent on the use of biometric technology is growing, with some key cases going back decades and other more recent cases having raised serious questions about the admissibility of biometric evidence in court. In this paper authors is about to explain influence of reliability of biometric system on general acceptance of digital evidence in Court of Justice process. Through paper authors are also about to propose vulnerability assessment of biometric system as improvementfactor of reliability of existing methodology for preserving chain of custody of digital evidence called DEMF (Digital Evidence Management Framework). Improvement proposal is presented as an introduction of phase of biometric vulnerability evaluation methodology within proposedframework called APDEMF (Admissibility procedure of DEMF). Using UML (Universal Modeling Language) modeling methodology authors are about to represent a APDEMF framework which will describe essential phases of the same process.</p>2014-06-26T10:35:08+02:00https://jios.foi.hr/index.php/jios/article/view/847Using Coevolution Genetic Algorithm with Pareto Principles to Solve Project Scheduling Problem under Duration and Cost Constraints2014-06-26T15:40:21+02:00Alexandr Victorovich Budylskiyalexandrvictor88@mail.ruIrina Kvyatkovskaya Yuryevnai.kvyatkovskaya@astu.org<p class="Abstract"><span lang="EN-US">This article considers the multicriteria optimization approach using the modified genetic algorithm to solve the project-scheduling problem under duration and cost constraints. The work contains the list of choices for solving this problem. The multicriteria optimization approach is justified here. The study describes the Pareto principles, which are used in the modified genetic algorithm. We identify the mathematical model of the project-scheduling problem. We introduced the modified genetic algorithm, the ranking strategies, the elitism approaches. The article includes the example. </span></p>2014-06-26T10:35:01+02:00https://jios.foi.hr/index.php/jios/article/view/852Intention to Use and Variables Influencing Intention to Use Electronic Government Services Among Citizens2014-06-26T15:40:22+02:00Mario Klačmermario.klacmer@vz.t-com.hrNeven Vrčekneven.vrcek@foi.hrEach organization should be aiming at higher efficiency. Government institutions should not make an exception.Business processes of today’s government institutions are extremely influenced by modern ICT and user acceptance plays a pivotal role in success of all ICT projects. As government tends to design and launch online services without actually measuring citizens’ needs, understanding citizens’ (taxpayers’) needs is becoming crucial for government institutions.In this paper, a range of earlier studies have been critically analyzed and comparedto provide anintegrated model that can identify factors which could influence adoption of e-government services. The goal of this article is to study citizens’ demand for different levels of electronic government service and to find factors which influence the adoption ofthese same services.This study integrates variables from technology acceptance model (TAM) and trustworthiness model.Analysis of the results indicates that there is a significant positive relationship between Trust in Internet, Perceived usefulness, Perceived ease of use andtheIntentionto use. Implications for further research are discussed.2014-06-26T10:34:53+02:00https://jios.foi.hr/index.php/jios/article/view/857Elements of Resource Representation in Institutional Repositories: a Bibliographic Review2014-06-26T15:40:22+02:00Jose Daniel Texierdantexier@hotmail.comMarisa De Giustimarisa.degiusti@sedici.unlp.edu.ar<span>This review focuses on identifying how the literature studies the existing problems in the Resource Representation (RR) of Institutional Repositories (IR). RR is a process of recording in a persistent manner a set of data (metadata) as a synthesis and replacement of the "real" object, to allow its identification, retrieval and dissemination. RR is defined by certain elements: resources, metadata schema, storage and cataloging. On the other hand, IRs are based on functional processes according to the material that is deposited and the ISO 14.721 standard: </span><em>ingest</em><span>, </span><em>storage</em><span>, </span><em>cataloging</em><span>,</span><em>indexing</em><span>, </span><em>search engine</em><span> and </span><em>browsing</em><span>. The results of this review show that identifying the problems found in these elements and functional processes is not a subject of study for the researchers, which leads to a vacant area in this field, and in this way to solve some of the problems present in the RI, from the point of view of functional elements and processes.</span>2014-06-26T10:34:45+02:00https://jios.foi.hr/index.php/jios/article/view/856An Artificial Neural Network Modeling for Force Control System of a Robotic Pruning Machine2014-06-26T15:40:22+02:00Ali Hashemihashemi@pgu.ac.irKeyvan Asefpour Vakiliankeyvan.asefpour@ut.ac.irJavad Khazaeijkhazaei@ut.ac.irJafar Massahjmassah@ut.ac.ir<p class="Abstract">Nowadays, there has been an increasing application of pruning robots for planted forests due to the growing concern on the efficiency and safety issues. Power consumption and working time of agricultural machines have become important issues due to the high value of energy in modern world. In this study, different multi-layer back-propagation networks were utilized for mapping the complex and highly interactive of pruning process parameters and to predict power consumption and cutting time of a force control equipped robotic pruning machine by knowing input parameters such as: rotation speed, stalk diameter, and sensitivity coefficient. Results showed significant effects of all input parameters on output parameters except rotational speed on cutting time. Therefore, for reducing the wear of cutting system, a less rotational speed in every sensitivity coefficient should be selected.</p>2014-06-26T10:34:36+02:00https://jios.foi.hr/index.php/jios/article/view/855From the Editor2013-12-10T10:20:52+01:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,</p><p>it is my pleasure to present you the 2nd number of the 37th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientic papers and 2 preliminary communications has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>The mission of JIOS is to cover scientic publications from broad area of information sciences and related disciplines and we continuously receive many articles in which authors strive to achieve scientic merit. Our review procedure is very strict but even when we decline papers we try to encourage authors in their future work and motivate them to give better results. That is why we maintain very good relations with our authors and we invite all of you to extend cooperation with JIOS.</p><p>We hope that the variety of themes will draw the attention of researchers in dierent elds of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue our work of delivering research results to interested audience. The ICT eld is changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions. That is why we encourage and promote scientic collaboration across scientic areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulll our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute signicantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in nine well known databases and we are proud to announce that from this issue we are indexed in two more databases Index Copernicus and Directory of Research Journals Indexing. We are continuously investing a lot of eort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p>2013-12-10T09:51:28+01:00https://jios.foi.hr/index.php/jios/article/view/854Cover pages2013-12-10T10:20:52+01:00Neven Vrčekneven.vrcek@foi.hr<span>Here you can download journal cover pages.</span>2013-12-10T09:47:22+01:00https://jios.foi.hr/index.php/jios/article/view/849Designing Gaussian Membership Functions for Fuzzy Classifier Generated by Heuristic Possibilistic Clustering2013-12-12T11:18:42+01:00Dmitri Arkady Viattcheninviattchenin@mail.ruReyhane Tatitati.computer@gmail.comAliaksandr Damaratskia.damaratski@gmail.comThe paper deals with the problem of constructing Gaussian membership functions of fuzzy sets for fuzzy rules derived from the data by using heuristic algorithms of possibilistic clustering. Basic concepts of the heuristic approach to possibilistic clustering are reminded and the extended technique of constructing membership functions of fuzzy sets is proposed. An illustrative example is given and preliminary conclusions are made.2013-12-10T09:36:07+01:00https://jios.foi.hr/index.php/jios/article/view/820Information Technology and Accounting Information Systems’ Quality in Croatian Middle and Large Companies2013-12-12T11:20:01+01:00Ivana Mamić Sačerimamic@efzg.hrAna Oluićaoluic@efzg.hrAn accounting information system is of a great importance for preparing quality accounting information for a wide range of users. The study elaborates the impact of information technology on accounting process and as a consequence on accounting information systems quality. This paper analyzes the basic characteristics of accounting information systems quality, discussing the model of AIS’s quality measurement. The perception of the quality of accounting information systems by accountants in medium and large companies in Croatia is also presented. The paper presents the historical overview of AIS’s quality based on three empirical studies conducted in 2001, 2008 and 2012.<br />2013-12-10T09:35:53+01:00https://jios.foi.hr/index.php/jios/article/view/846Knowledge Organization of Integrated Water Resources Management: A Case of Chi River Basin, Thailand2013-12-12T11:16:31+01:00Nattapong Kaewboonmakaewboonma@gmail.comKulthida Tuamsukkultua@kku.ac.thWanida Kanarkardwanida@kku.ac.th<p>This study is a part of the research project on the Development of an Ontology-Based Semantic Search for Integrated Water Resources Management of the Chi River Basin (CRB), Thailand. The study aimed at developing the knowledge domain of water resources management for CRB. The research methods included document analysis and qualitative research by adopting Liou (1990)’s knowledge acquisition approach. Fifteen experts including ten experts in the areas of environmental engineering, water resources engineering, and GIS, and seven government officers who has been involving with water management in the CRB were interviewed. The experts also took part in the processes of developing the knowledge domain, classifying, and structuring the knowledge for water resources management in the CRB.</p><p>The results of this research were the knowledge domain of water resource management for CRB. An example of the water resources management knowledge domain which was structuredby following concepts and processes of water resources management in Thailand is shown in this paper.</p>2013-12-10T09:35:40+01:00https://jios.foi.hr/index.php/jios/article/view/816Interpretation of Fuzzy Attribute Subsets in Generalized One-Sided Concept Lattices2013-12-12T11:05:05+01:00Peter Butkapeter.butka@tuke.skJozef Pocspocs@saske.skJana Pocsovajana.pocsova@tuke.skIn this paper we describe possible interpretation and reduction of fuzzy attributes in GeneralizedOne-sided Concept Lattices (GOSCL). This type of concept lattices represent generalization ofFormal Concept Analysis (FCA) suitable for analysis of datatables with different types of attributes. FCA as well as generalized one-sided concept lattices represent conceptual data miningmethods. With growing number of attributes the interpretation of fuzzy subsets may become unclear, hence another interpretation of this fuzzy attribute subsets can be valuable. The originalityof the presented method is based on the usage of one-sided concept lattices derived from submodels of former object-attribute model by grouping attributes with the same truth value structure.This leads to new method for attribute reduction in GOSCL environment.2013-12-10T09:35:13+01:00https://jios.foi.hr/index.php/jios/article/view/824The Application of Multimedia Aimed at Improving the Acquisition of Typical Topics in Natural and Social Science Programs in High Schools2013-12-10T10:20:52+01:00Bojan Banićbojan.banic@vz.t-com.hr<p>The issue of natural and social science courses in high schools, as well as in grammar schools, is very important not only on a global level. Therefore, the aim of this study is to address the issue of improving the process of learning with an emphasis on those subjects which students of a certain program find difficult.</p><p>By means of its application in teaching, multimedia – being a combination of various media – has enabled the introduction of new channels in the information transfer process, i.e. the reception of information through multiple sensors. At the same time the mentioned fact represents the advantage of multimedia materials over classical textual materials.</p><p>The research was conducted on the sample of 121 students, namely two social science classes (62 students) and two natural science classes (59 students). Ultimately, the result of the study is the quantification of the effect of multimedia on various student groups, as well as the recognition of differences when it comes to subject preferences, learning styles and attitudes towards learning.</p><p> </p>2013-12-10T09:34:43+01:00https://jios.foi.hr/index.php/jios/article/view/840List of reviewers2013-06-26T13:57:35+02:00Neven Vrčekneven.vrcek@foi.hr<ul><li><strong>Daniel Rodriguez<br /> </strong>University of Alcala, Spain</li><li><strong>Ivan Magdalenic</strong><br /> University of Zagreb, Croatia</li><li><strong>Joaquim Filipe <br /> </strong>Polytechnic Institute of Setúbal, Portugal</li><li><strong>Sergei Silvestrov<br /> </strong>Mälardalen University, Sweden<strong></strong></li><li><strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Matilda Drozdova<br /> </strong>University of Žilina, Slovakia<strong></strong></li><li><strong>Maria Jose Escalona<br /> </strong>University of Seville, Spain<strong></strong></li><li><strong>Wolf Rauch<br /> </strong>University of Graz, Austria<strong></strong></li><li><strong>Sandro Gerić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Neven Vrcek<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Marina Klačmer Čalopa<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Mohit Verma<br /> </strong>Institute of Management Technolopgy, Dubai<strong></strong></li></ul>2013-06-26T13:50:05+02:00https://jios.foi.hr/index.php/jios/article/view/839List of reviewers2013-06-26T13:57:58+02:00Neven Vrčekneven.vrcek@foi.hr<ul><li><strong>József Tar<br /> </strong>Institute of Intelligent Engineering Systems, Budapest<strong></strong></li><li><strong>Gašper Mušič<br /> </strong>University of Ljubljana, Slovenia<strong></strong></li><li><strong>William Steingartner<br /> </strong>Technical University of Košice, Slovakia<strong></strong></li><li><strong>Ivana Jugović</strong><br /> Institute for Social Research, Croatia<strong></strong></li><li><strong>Gilda Pecaric<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Elisabeth Pergler<br /> </strong>Evolaris next level GmbH, Austria<strong></strong></li><li><strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Peter Andreae</strong><br /> Victoria University, New Zealand</li><li><strong>Jan Paralic</strong><br /> Technical University Kosice, Slovakia</li><li><strong>Diana Šimić<br /> </strong>University of Zagreb, Croatia</li><li><strong>Nadica Hrgarek<br /> </strong>MED-EL Medical Electronics, Austria<strong></strong></li><li><strong>Jadranka Stojanovski<br /> </strong>Rudjer Boskovic Institute, Croatia<strong></strong></li><li><strong>Milan Ambroz</strong><br /> Human Resources Professional, Slovenia<strong></strong></li><li><strong>Katarina Žager</strong><br /> University of Zagreb, Croatia<strong></strong></li><li><strong>Kresimir Fertalj<br /> </strong>University of Zagreb, Croatia<strong></strong></li></ul>2013-06-26T13:41:02+02:00https://jios.foi.hr/index.php/jios/article/view/838List of reviewers2013-06-26T13:58:26+02:00Neven Vrčekneven.vrcek@foi.hr<ul><li><strong>Jasminka Dobša<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Kornelije Rabuzin<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Ali Koyuncugil<br /> </strong>Capital Markets Board of Turkey, Turkey<strong></strong></li><li><strong>Ivan Magdalenic<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Kresimir Fertalj<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Markus Schatten<br /> </strong>University of Zagreb, Croatia<strong></strong></li><li><strong>Dmitri Viattchenin</strong><br /> United Institute of Informatics Problems of the NAS of Belarus, Belarus</li><li><strong>C. Hurt<br /> </strong>University of Wisconsin, USA<strong></strong></li><li><strong>Vesna Čančer</strong><br /> University of Maribor, Slovenia</li><li><strong>Zeljka Mihajlovic</strong><br /> University of Zagreb, Croatia</li><li><strong>Renata Mekovec<br /> </strong>University of Zagreb, Croatia<br /> <strong>Alen Lovrenčić<br /> </strong>University of Zagreb, Croatia</li></ul>2013-06-26T13:37:48+02:00https://jios.foi.hr/index.php/jios/article/view/837From the Editor2013-06-19T09:55:28+02:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,</p><p><br />it is my pleasure to present you the 1st number of the 37th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientific papers, 1 preliminary communication and 1 survey paper has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover broad themes from various ICT fields and related areas: software engineering, strategic planning of information systems, knowledge management and quantum computing. We hope that the variety of themes will draw the attention of researchers in different fields of information sciences and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community. These themes motivate us to continue our work of delivering research results to interested audience. The ICT field is changing rapidly and we are constantly searching for cutting edge articles that open perspective and motivate further research. We have to notice that future of ICT related research is in interdisciplinary approach and relations with other research domains which is highly emphasized in Horizon 2020 directions. That is why we encourage and promote scientific collaboration across scientific areas that will bring us new interesting articles. We hope that many of you who will read the Journal will join us as authors, readers and reviewers and help us to fulfill our mission. The number of submitted papers increases every year giving us opportunity to increase the quality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute significantly to the rising quality of JIOS.So far JIOS has been indexed in nine well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p>2013-06-19T09:53:27+02:00https://jios.foi.hr/index.php/jios/article/view/836Cover pages2013-06-19T09:55:28+02:00Neven Vrčekneven.vrcek@foi.hr<span>Here you can download journal cover pages.</span>2013-06-19T09:32:11+02:00https://jios.foi.hr/index.php/jios/article/view/831Factors of Knowledge Management and the impact of employee turnover in activity and performance in scientific and technological parks in Slovenia2013-06-19T10:19:51+02:00Vasja Roblekvasja.roblek@gmail.comZlatka Meško Štokzlatka.stok@fm-kp.siMaja Meškomaja.mesko@gmail.comIvan Erendaivan.erenda@gmail.comTechnology parks provide infrastructure for the creation and developmentof knowledge-based organizations, which are associated with centers oftechnological excellence, mainly universities. This research addresses thequestion of management and skills acquisition in member organizations oftechnology parks in Slovenia. As means and lever for development organizations,we recognize the values and organizational culture, which cannot be achievedwithout employees who possess good knowledge. We associated knowledgemanagement with employee turnover factor. The central purpose of this researchis to focus on exploring the impact of movements in knowledge management on theturnover in organizations, which are members of technology parks. By usingmultivariate regression methods we confirmed that the required skills,knowledge acquisition and knowledge transfer channels, have a statisticallysignificant effect on employee turnover in technology parks.2013-06-19T09:27:03+02:00https://jios.foi.hr/index.php/jios/article/view/801Impact of Aspect-Oriented Programming on the Quality of Novices’ Programs: A Comparative Study2013-06-19T09:55:28+02:00Marija Katicmarija.katic@fer.hrIvica Botickiivica.boticki@fer.hrKresimir Fertaljkresimir.fertalj@fer.hr<p class="Abstract">Aspect-oriented programming has been introduced in order to increase the modularity of object-oriented programs and is claimed to improve software quality. Although there are various researches on this claim, the question to what extent aspect-oriented programming improves the quality of programs depending on a developer’s experience still remains. The purpose of this study is to investigate whether aspect-oriented programming used by novice programmers improves the quality of programs, in terms of software flexibility and readability (consequently reusability and maintainability as well). As a part of an undergraduate course in programming paradigms and languages, a systematic comparison between students’ object-oriented and aspect-oriented solutions of the same problem was driven. In order to drive this comparison we have established the basis for the development of the new quality assessment model consisting of software metrics for an objective evaluation and student survey for subjective evaluation. The results show that the use of aspect-oriented programming lead to novices’ programs that are easier to change and read (flexible and readable) compared to object-oriented programs. What is more, administered survey showed that students perceive their programs as more flexible and readable.</p>2013-06-19T09:26:58+02:00https://jios.foi.hr/index.php/jios/article/view/595Dynamic Aspects of the Strategic Planning of Information Systems2013-06-19T09:55:28+02:00Marko Hellmarko.hell@efst.hrStjepan Vidačićstjepan.vidacic@foi.hrJosip Brumecjosip.brumec@foi.hr<p>The SPIS methodology provides methods and techniques of developing an information system (IS) that would correspond with the requirements of an organization. The result of its application is the strategic plan of IS development that would meet the future needs. As is the case in the methodology of the strategic planning in general, the primary drawback to the strategic planning of the information system is the lack of efficient control of implementation of the strategic plan, and this is precisely what this research paper deals with. One of the procedures in the measuring of results of an organization, which is also recommended by the SPIS, is the Balanced Scorecard methodology (BSC). However, the BSC concept which the classic SPIS methodology recommends as suitable for the evaluation of performance of the information technology (IT) on the business system and the performance of that new business system, does not take into account the constraint that may lead to non-implementation of the planned activities. Furthermore, the BSC has been criticised for the oversimplified modelling of the cause-consequence relations that do not take into account the time delay and the feedback.<br />This paper provides results of the research that resulted in identification of two types of constraints that need to be included when determining the optimal IS/IT strategy. Within the context of the system dynamics (SD) approach, the broadening of the problem with the analysis of the strategy implementation dynamics results in the new practical knowledge about the control over the time-dependant values and, consequently, with a proposal that would eliminate the reasons for the abovementioned criticism.</p>2013-06-19T09:26:53+02:00https://jios.foi.hr/index.php/jios/article/view/813A New Quantum Game Based on CHSH Game2013-06-19T09:55:28+02:00Alan Bojićabojic@foi.hr<p class="Abstract">The Quantum game theory is an extension of the classical game theory which describes games in which players share quantum information during the game. The use of the quantum mechanical effects enables players’ better results than they would achieve in the classical game without sharing any information at all. In this paper I would like to describe a new two player cooperative game which is based on the well known CHSH game. A quantum strategy for a new game will be introduced and it will be compared to the classical strategy and CHSH game strategy.</p>2013-06-19T09:26:47+02:00https://jios.foi.hr/index.php/jios/article/view/793Creating TTCN-3 Test Suite from CPN Specification2013-06-19T09:55:28+02:00Marina Bagic Babacmarina.bagic@fer.hrDragan Jevticdragan.jevtic@fer.hrTesting of a software product is the key activity before deploying it in the real-time environment. Therefore testing should be introduced into the product development process as early as possible in order to decrease the costs of repairing the damage in later phases. In this paper we use Coloured Petri Nets (CPN) for the system specification and also as a system to be tested instead of its implementation. This specification also serves as the basis for the test suite generation. Test cases are provided in the language of Testing and Test Control Notation version 3 (TTCN-3) due to its general application area and platform independence.2013-06-19T09:26:41+02:00https://jios.foi.hr/index.php/jios/article/view/806Cover pages2012-12-13T11:01:28+01:00Neven Vrčekneven.vrcek@foi.hrHere you can download journal cover pages.2012-12-13T10:49:30+01:00https://jios.foi.hr/index.php/jios/article/view/805From the Editor2012-12-13T11:01:28+01:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,</p><p>It is my pleasure to present you the 2nd number of the 36th volume of the Journal of Information andOrganizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientic papers, 3 preliminary communications and 1 surveypaper has been included, all of which have undergone a rigorous double-blind review process insome cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICTelds and related areas: computer algorithms, ERP systems, business process analysis, and otherrelated themes. We hope that the variety of themes will draw the attention of researchers in dierentelds of information sciences and motivate potential authors to expand the Journal’s thematic scopeby other themes that may be of interest to the wider ICT research community. These themes motivatesus to continue our work of delivering research results to interested audience. We hope that many ofyou who will read the Journal will join us as authors, readers and reviewers and help us to fulll ourmission. The number of submitted papers increases every year giving us opportunity to increase thequality and visibility of JIOS.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, tosubmit papers at http://jios.foi.hr. You are also invited to share with us your comments or criticalremarks regarding the papers previously published in the Journal. Further, we would appreciate yourwillingness to become a reviewer for submitted papers and thus contribute signicantly to the risingquality of JIOS.</p><p>So far JIOS has been indexed in nine well known databases. We are continuously investing a lot ofeort to extend the list of databases where JIOS would be cited, in order to make the publishedpapers available to a larger readers’ audience, and give your research a greater impact factor.</p>2012-12-13T10:44:10+01:00https://jios.foi.hr/index.php/jios/article/view/787Comparison of simple graphical process models2012-12-13T11:01:28+01:00Katarina Tomicic-Pupekktomicic@foi.hrIvan Vidovićivvidovic@foi.hrMartina Tomičić Furjanmartina.tomicic@foi.hr<p>Comparing structure of graphical process models can reveal different variations of processes. Since most contemporary norms for process modeling lean on directed connectivity of objects in the model, their connections structure form sequences which can be translated into performing scenarios. While the sequences can be tested for completeness in performing process activities using simulation methods, the similarity or difference of static characteristics of sequences in different model variants is difficult to explore.</p> <p>The goal of the paper is to test the appliance of a method for comparison of graphical models by analyzing and comparing the static characteristics of process models. Therefore a metamodel of process models is developed and a comparison procedure conducted using a graphical model comparison algorithm.</p>2012-12-13T10:22:00+01:00https://jios.foi.hr/index.php/jios/article/view/789Croatian banking sector research: relationship between ownership structure, concentration, owners’ type and bank performance2012-12-13T11:01:28+01:00Igor Tomičićigor.tomicic@foi.hrAna Ćorićana.coric@foi.hrMarina Klačmer Čalopamarina.klacmer@foi.hrBanks are important financial intermediaries of any national economy, and corporate governance has an important role in banking sector; especially due to processes of the globalization and the internationalization, and also because of the sensitivity of the activities between the interest groups. The objective of this paper is to examine the relationship between ownership structure, concentration, owners’ type and bank performance. The authors made a research of banks' ownership structure using publicly available data. Using statistical tools authors discovered relationships between bank ownership structure and bank performance indicators (average asset, total asset, average equity, profit (loss) before taxes, profit (loss) after taxes, ROAA, ROAE). Further they discuss the relationships between ownership structure and a number of consequences for the bank performance. The authors discovered significant correlation between bank ownership structure and performance indicators variables that are described in the paper.<br />2012-12-13T10:21:43+01:00https://jios.foi.hr/index.php/jios/article/view/245Documents for Visually Impaired Users in the Light of Library and Information Science2012-12-13T11:01:28+01:00Jiří Tomáš Stodolajjstodola@seznam.czThe article aims to show that the classical document paradigm in information science has the greatest potential to grasp the issues related to the providing information to persons with visual disabilities and it aims to check whether the FRBR study is usable in this area. The article is divided into two parts. In the first part, the paradigmatic turns in information science are briefly presented and there is examined their impact on the issues connected with users with visual disabilities. The second part briefly describes the structure of the bibliographic universe and there is examined how it is possible to create a model of documents for users with visual impairment and of associated processes. The model of the bibliographic universe is applied to the situation of the really existing documents for visually impaired users. Methodologically, the article is based on the information system analysis. There is used an entity-relationship approach to a model of the bibliographic universe.2012-12-13T10:21:36+01:00https://jios.foi.hr/index.php/jios/article/view/795Critical Success Factors Aspects of the Enterprise Resource Planning Implementation2012-12-13T11:01:28+01:00Milorad Nikitovićmilorad.nikitovic@vsite.hrVjeran Strahonjavjeran.strahonja@foi.hr<p class="Abstract">Considering a global importance of small and medium sized enterprises (SMEs) they are in the spotlight of ERP implementation retail stores. Many of the relevant studies indicate the importance and diversity of the ERP implementation process. This paper presents results of the authors' research of the implementation success factors from the point of view of implementation participants. Based on the experience of a number of ERP implementations, authors compare the Croatian and international implementing practice of ERP solutions, taking into account the same critical success and the same ERP solution. Te emphasisis is put specifically on the three key participants in an implementation process: CEOs, project managers and successful-advanced users. Regardless of the relatively limited number of end users who took part in this study, it indicates a significant coincidence of Croatian and international practices in the part of perception of the critical success factors for ERP implementation, but also different views of key participants in the successful implementation.</p>2012-12-13T10:21:30+01:00https://jios.foi.hr/index.php/jios/article/view/207Differentiating between Student Evaluation of Teacher and Teaching Effectiveness2012-12-13T11:01:28+01:00Goran Hajdingoran.hajdin@foi.hrKatarina Pažurkatarina.pazur@foi.hr<p>Teachers are considered to be principal actors in the teaching process as well as one of its major constituents when quality and equity are concerned. Over the last decade a lot of papers have been published that deal with the quality of the teaching process and teachers. Most of them focus on students as the main subjects in evaluation of the teaching process and teachers. In this paper we analyze freshmen and senior students’ ability to differentiate between the evaluation of teacher and evaluation of teaching. In a lot of questionnaires used in research into this topic there is no difference in the approach to these two diverse aspects of the educational process quality. Since students are commonly the main target group of such questionnaires, in this paper we present the results of the study aimed at determining which elements, from the students’ perspective, are recognized and associated with teaching, and which ones with teachers.</p>2012-12-13T10:20:42+01:00https://jios.foi.hr/index.php/jios/article/view/596Planning and Optimization of AGV Jobs by Petri Net and Genetic Algorithm2012-12-13T11:01:28+01:00Anita Gudeljanita@pfst.hrDanko Kezićdanko@pfst.hrStjepan Vidačićstjepan.vidacic@foi.hr<p class="Abstract">The following article presents the possibilities of job optimization on a maritime container terminal, in order to increase the system productivity and optimize the terminal capacity. Automated guided vehicles (AGVs) are now becoming popular mode of container transport in seaport terminals. The moving of vehicles can be described as the set of discrete events and states. Some of these states can be undesirable such as conflicts and deadlocks. It is necessary to apply adequate control policy to avoid deadlocks and block the vehicles’ moving only in the case of dangerous situation.<br />This paper addresses the use a Petri net as modeling and scheduling tool in this context. The aim of AGV scheduling is to dispatch a set of AGVs to improve the productivity of a system and reduce delay in a batch of pickup/drop-off jobs under certain constraints such as deadlines, priority, etc. The final goals are related to optimization of processing time and minimization of the number of AGVs involved while maintaining the system throughput.<br />To find better solutions, the authors propose the integration MRF1 class of Petri net (MRF1PN) with a genetic algorithm. Also, the use of a matrix based formal method is proposed to analyze discrete event dynamic system (DEDS). The algorithm is described to deal with multi-project, multi-constrained scheduling problem with shared resources. The developed model was tested and validated by simulation of typical scenarios of the container terminal of Port Koper. Modularity and simplicity of the approach allow using the model to monitor and test the efficiency of the processes, and also to propose future alternative solutions to optimize the schedule of operations and the employment of AGV at the terminal.</p>2012-12-13T10:20:31+01:00https://jios.foi.hr/index.php/jios/article/view/624Quantum Algorithm for Finding a Maximum Clique in an Undirected Graph2012-12-13T11:01:28+01:00Alan Bojićabojic@foi.hr<p class="Abstract">The maximum clique in an undirected graph is the largest subset of a set of graph's vertices where each pair of elements in the subset is connected. In this paper I would like to propose an algorithm for quantum computers that finds a maximum clique in an arbitrary undirected graph. An algorithm has O(|V|2<sup>|V|/2</sup>) worst case time complexity and O(2<sup>|V|/2</sup>) best case time complexity. Algorithm's space complexity for each case is O(|V|). An algorithm is based on a version of Grover's quantum algorithm for finding element in an unsorted list in which there can be an unknown number of solutions.</p>2012-12-13T10:19:47+01:00https://jios.foi.hr/index.php/jios/article/view/786From the Editor2012-06-30T17:35:40+02:00Neven Vrčekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,</p><p>It is my pleasure to present you the 1st number of the 36th volume of the Journal of Information and Organizational Sciences – JIOS.</p><p>In this issue a selection of 5 original scienti! c papers and 1 survey paper has been included, all of which have undergone a rigorous double-blind review process in some cases in several rounds.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: computer programming, mobile technologies, symbolic logic in the field of informationsciences, business processes, formal concept analysis, data analysis, management and other related themes. We hope that the variety of themes will draw the attention of researchers in di" erent ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at http://jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate your willingness to become a reviewer for submitted papers and thus contribute signi! cantly to the rising quality of JIOS.<br />So far JIOS has been indexed in nine well known databases. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to make the published papers available to a larger readers’ audience, and give your research a greater impact factor.</p>2012-06-30T17:24:31+02:00https://jios.foi.hr/index.php/jios/article/view/785Cover pages2012-12-13T10:46:23+01:00Neven Vrčekneven.vrcek@foi.hr<span>Here you can download journal cover pages.</span>2012-06-30T17:17:58+02:00https://jios.foi.hr/index.php/jios/article/view/210Adapting hierarchical clustering distance measures for improved presentation of relationships between transaction elements2012-06-30T18:19:25+02:00Mihaela Vranićmihaela.vranic@fer.hrDamir Pintardamir.pintar@fer.hrDragan Gambergerdragan.gamberger@irb.hrCommon goal of descriptive data mining techniques is presenting new information in concise, easily interpretable and understandable ways. Hierarchical clustering technique for example enables simple visualization of distances between analyzed objects or attributes. However, common distance measures used by existing data mining tools are usually not well suited for analyzing transactional data using this particular technique. Including new types of measures specifically aimed at transactional data can make hierarchical clustering a much more feasible choice for transactional data analysis. This paper presents and analyzes convenient measure types, providing methods of transforming them to represent distances between transaction elements more appropriately. Developed measures are implemented, verified and compared in hierarchical clustering analysis on both artificial data as well as referent transactional datasets.2012-06-30T16:48:38+02:00https://jios.foi.hr/index.php/jios/article/view/218Automated motive-based user review analysis in the context of mobile app acceptance: Opportunities and applications2012-07-13T11:55:31+02:00Elisabeth Perglerelisabeth.pergler@evolaris.netThe increasing amount and importance of user-generated content that is available in the web necessitates methods of its effective and efficient utilization. In this paper a system is presented that enables automated classification of user reviews concerning the usage motives mentioned in the reviews. Four possible applications of the system are discussed in detail in the course of this paper: a learning environment for mobile app development, a download prognosis mechanism, an app prizing decision support system, and a recommendation system. These applications are evaluated concerning state-of-the-art methods that currently address the challenge as well as advantages of the implementation of a motive-based system in the particular business processes.2012-06-30T16:48:06+02:00https://jios.foi.hr/index.php/jios/article/view/225Utilizing GPGPU in Computer Emulation2012-06-30T17:35:41+02:00Peter Jakubcopeter.jakubco@tuke.skSlavomir Simonakslavomir.simonak@tuke.skThe article deals with the idea of computer emulation using the GPGPU technology in order to get performance improvements. Basic assumptions for using stream processing in computer emulation effectively are discussed and the structure of an emulator, together with the emulation technique are proposed. The emulator structure, in this case, is of distributed nature, so the communication issues are treated too. As an example demonstrating the viability of the proposal, Random Access Machine (RAM) emulator is given within the paper.2012-06-30T16:46:26+02:00https://jios.foi.hr/index.php/jios/article/view/400Classification of Hydro Chemical Data in the Reduced Dimensional Space2012-06-30T17:35:40+02:00Jasminka Dobšajasminka.dobsa@foi.hrPetr Prauspetr.praus@vsb.czAswani Kumar Cherukuricherukuri@acm.orgPavel Prakspavel.praks@gmail.com<p>The main objective of this paper is to systematically analyze the performance of water samples classifications for different data representations. We compare the classification of full data representation to the classification of data items in lower dimensional space obtained by projection of original data on the space of first principal components and further on the space of centroids of classes. We use linear support vector machines for classification of ground water samples collected from five different localities of Odra River basin and results are evaluated by standard measures including recall, precision and F<sub>1</sub>measure.</p>2012-06-30T16:45:56+02:00https://jios.foi.hr/index.php/jios/article/view/204Portable reflection for C++ with the Mirror library2012-06-30T17:35:40+02:00Matus Chochlikmatus.chochlik@fri.uniza.skReflection and reflective programming can be used for a wide range of tasks such as implementation<br />of serialization-like operations, remote procedure calls, scripting, automated GUIgeneration,<br />implementation of several software design patterns, etc. C++ as one of the most<br />prevalent programming languages however, for various reasons, lacks a standardized reflection<br />facility. In this paper we present Mirror - a portable library adding reflection to C++ with a<br />command-line utility automating its usage. This library supports functional style static compiletime<br />reflection and metaprogramming and also provides two different object-oriented run-time<br />polymorphic layers for dynamic reflection.2012-06-30T16:45:15+02:00https://jios.foi.hr/index.php/jios/article/view/228Use of Concept Lattices for Data Tables with Different Types of Attributes2012-06-30T17:35:40+02:00Peter Butkapeter.butka@tuke.skJozef Pocspocs@saske.skJana Pocsovajana.pocsova@tuke.skIn this paper we describe the application of Formal Concept Analysis (FCA) for analysis of data tables with different types of attributes. FCA represents one of the conceptual data mining methods. The main limitation of FCA in classical case is the exclusive usage of binary attributes. More complex attributes then should be converted into binary tables. In our approach, called Generalized One-Sided Concept Lattices, we provide a method which deal with different types of attributes (e.g., ordinal, nominal, etc.) within one data table. Therefore, this method allows to create same FCA-based output in form of concept lattice with the precise many-valued attributes and the same interpretation of concept hierarchy as in the classical FCA, without the need for specific unified preprocessing of attribute values.2012-06-30T16:44:44+02:00https://jios.foi.hr/index.php/jios/article/view/264COVER PAGES2012-04-18T13:33:49+02:00Željko Hutinskizeljko.hutinski@foi.hrMirko Malekovićmirko.malekovic@foi.hrHere you can download cover pages.2012-04-17T11:45:07+02:00https://jios.foi.hr/index.php/jios/article/view/244From the Editor2012-03-16T09:39:00+01:00Željko Hutinskizeljko.hutinski@foi.hrMirko Malekovićmirko.malekovic@foi.hrThis issue of the journal JIOS, “Journal of Information and OrganizationalSciences” presents a selection of the papers presented at the 15th InternationalConference on Information and Intelligent Systems held in Varaždin, September2004. The papers were selected after thorough review of at least two internationalreferees. The papers are arranged in alphabetic order, according the surname of thefirst author as referential.2012-03-16T09:38:49+01:00https://jios.foi.hr/index.php/jios/article/view/243ACTIVE DATABASES, BUSINESS RULES AND REACTIVE AGENTS – WHAT IS THE CONNECTION?2012-03-16T09:39:00+01:00Kornelije Rabuzinkornelije.rabuzin@foi.hrMirko Malekovićmirko.malekovic@foi.hrMiroslav Bačamiroslav.baca@foi.hrThese three technologies were and still are mainly treated separately. Since notmuch work has been carried out in defining and combining them together, we are going topresent what has been done and put accent on what could be done. Namely, they rely uponsimilar paradigms and concepts, as will be shown later on, and can be treated ascomplementary technologies. In this paper we will show that reactive agents reactaccording to some set of business rules and active databases can be used as a suitablemeans for implementing business rules and in those way reactive agents as well. Sincereactive agents have been well defined, recent improvements in the fields of activedatabases technology and especially business rules provide the reason to consider thebenefits to be achieved from combining these fields.2012-03-16T09:29:16+01:00https://jios.foi.hr/index.php/jios/article/view/242DATA ANALYSIS FOR AGENT BASED MOBILE SERVICES2012-03-16T09:39:00+01:00Marek ParaličMarek.Paralic@tuke.skJán ParaličJan.Paralic@tuke.skOne of the high interesting areas in the distributed systems is the problem ofbuilding and running pervasive computing services for mobile users. The central point forbuilding such a services is to appropriately model the physical and data environment. In thispaper we concentrate on the data part of such an environment that would enable creating ageneral scheme for a category of flexible services for mobile users. We define the basicprofile of the users and methods, how the services should deal with the profiles. Formodeling the presence of the user in the data environment (even if he/she is off-line) theagent-based solution was chosen, so the distributed system is build as a multi-agent system.2012-03-16T07:46:01+01:00https://jios.foi.hr/index.php/jios/article/view/241GENERIC APPROACH IN CHOICE OF ADEQUATE METHODOLOGY FOR THE ASSESSMENT OF IT INVESTMENTS2012-03-16T09:39:00+01:00Melita Kozinamelita.kozina@foi.hrInvestments into information technology (IT), (hereinafter: IT investments) havereached very high figures, which are still continually on the rise. IT potentials are being usedin an increasing number of ways. Various company managers have different approaches tothis issue. A large number of methods/models for the assessment of IT investments isavailable, so the question is posed of how to choose the adequate assessment category. Thesaid reasons have initiated a need for defining the generic approach in the choice ofadequate methodology for the assessment of IT investments, which was indeed the goal ofthis paper. General ideas to this approach stem from the fact that each IT investment has itspurpose and belongs to a certain type of IT investment (decision-making aspect) whichdemands its relevant methodology for assessing IT investments. Two groups of demands(conditions) have been defined in choosing relevant methodology. The first group pertains tomethodology analysis and determination of its compatibility with characteristics of thedefined decision-making aspect. The second group of conditions pertains to methodologyanalysis with respect to its possibilities (abilities) of integrating quantity, quality and riskfactors of IT decision. Conducted field research shows that the assessment of IT investmentshas been done mainly using simpler methods/models and their combinations, and is focusedon quantity aspects of IT values.2012-03-16T07:39:57+01:00https://jios.foi.hr/index.php/jios/article/view/240A TRANSACTION COST ANALYSIS OF MICROPAYMENTS IN MOBILE COMMERCE2012-03-16T09:39:00+01:00Daniel Gillegille@iig.uni-freiburg.dePersonalised, location-related and differentiated services in the mobile digitaleconomy create a demand for suitable pricing models. In the case of disaggregated“microservices” (e.g., small digitalized information or service units), as well as for theacquisition of low-value physical goods, the deployment of micropayments seemsappropriate.This paper analyzes the economic efficiency of marginal transaction amounts in the mcommercearea by applying the theoretical approach of transaction cost economics. Forthis purpose, a separation of technical and cognitive transaction costs is applied. Theinfluence of selected determinants such as specifity, uncertainty and bounded rationality ontransaction costs in mobile commerce micropayments is analyzed. The result is a morelikely application of micropayments for physical goods such as beverages or parking ticketsthan for digital goods and services, given the theoretical assumptions of the model. Inaddition, indicators for a significant above-zero lower limit of transaction amounts inmobile commerce are presented.2012-03-16T07:38:21+01:00https://jios.foi.hr/index.php/jios/article/view/239THE RICH WORLD OF COMPUTER MODELLING AND PROBLEM SOLVING2012-03-16T09:39:00+01:00Vlatko Čerićdarko.grabar@foi.hrThis paper presents some interesting aspects of the rich world of computermodelling and problem solving. After discussing basic model building principles attentionis devoted to several modelling methods aimed for solving different types of problems.These are methods for modelling of optimisation problems, dynamic systems with randomcharacteristics, knowledge, uncertain phenomena, systems with graph structure, learning,as well as cooperation and competition. Basic characteristics of these methods andexamples of their application are given.2012-03-16T07:35:57+01:00https://jios.foi.hr/index.php/jios/article/view/238MODELING AND SOLVING SELF-REFERENTIAL PUZZLES2012-03-16T09:39:00+01:00Maja Bubalomaja@ffos.hrMirko Čubrilomirko.cubrilo@foi.hrThe so-called self-referential puzzles are a very interesting kind of logic puzzles,aiming at developing the skill of logical thinking. A self-referential puzzle consists of asequence of questions about the puzzle itself. In this paper, we shall show some selfreferentialpuzzles, demonstrate how to model and solve them as propositional logicproblems, and how to mechanically generate new puzzles. For this, we shall make use ofthe specific advantages of Mozart/Oz system – the finite domain constraint programminglanguage and environment.We shall also show some new puzzles, according to our best knowledge not yet publishedelsewhere. The program in Mozart/Oz using our method generated these puzzles.2012-03-16T07:33:17+01:00https://jios.foi.hr/index.php/jios/article/view/237From the Editor2012-03-15T13:05:59+01:00Željko Hutinskizeljko.hutinski@foi.hrMirko Malkoevićmirko.malekovic@foi.hrAll the papers in this issue of the JIOS Journal may fit into the Science as Usual categoryand are therefore not going to be dealt with in detail in the introduction. However, for oneof the papers included an exception has been provided, namely the paper Sigma-notationand the equivalence of P and NP classes by Miron Ivanovich Telpiz. The circumstancesleading to its publication in this issue of JIOS are presented by the editors in this preface.It is generally acknowledged that, ever since it was defined by S. Cook over thirty yearsago, P = NP has presented one of the major open problems in computing science andinformation science in general. Whereas, on one hand, this problem presents a formidablechallenge to any scientist dealing with it, its solution, especially in case it should turn out tobe a positive one considering that current technology tends to evolve in a practicaldirection and its overall functioning is conducted implicitly under the assumption of anegative solution would have a major impact on the development of informationtechnology as well as the wider context of human society as a whole. Apart from being putforward in conferences, both positive and negative “solutions” to P = NP problem can beoccasionally found in press, scientific and professional journals. The web page titled “Pversus-NP Page” (see http://www.win.tue.nl/~gwoegi/P-versus-NP.htm) provides anexcellent source for this issue. It contains links to papers stating that P = NP, as well asthose contradicting the opposite, i.e., stating that P NP. Furthermore, references are givento Oded Goldreich's rationale behind his decision not to review papers proposing solutionsto P = NP problem and related difficult problems because, in his own words, they “alsoattract the attention of non-experts, and one annoying consequence is a flood of falseclaims of resolutions of these problems” (see http://www.wisdom.weizmann.ac.il/~oded/faq.html). Dr. Goldreich a recognised figure amongmathematicians of our time – recommends other scientists to follow his example when thisissue is concerned. Nevertheless, his arguments (at least those regarding non-experts) aredefinitely not to be acknowledged in the case of the work of the Russian mathematician andlogician Miron Ivanovich Telpiz, (see http://www.tarusa.ru/~mit/ENG/eng.php for details),who has been developing his positionality theory for functions, with a special emphasis onBoolean functions, for over two decades. While doing so, he has been drawing its(primarily conceptual) analogy to positionality theory for number systems. Building on hisextensive theory, which is combinatory very complex one indeed, Dr. Telpiz states theproof of P = NP. The underlying theory itself was proposed in the first volume of his bookPositionality principle for notation and calculation the functions, originally published inRussian by the Institute of Space Researches of the Russian Academy of Science. It was dueto this book that contacts between a member of the Editorial Board and Dr. Telpiz, as wellas Dr. Andrej Fomin, his assistant and associate, were established. During those contactsthe idea evolved of Dr. Tepiz delivering an invited lecture at the IIS2004 Conference.Annual IIS Conferences have been organized by the Faculty of Organization andInformatics for years. A lecture on proving the statement P = NP was arranged.Unfortunately, Dr. Telpiz was eventually not capable of giving the lecture. Nevertheless, heproposed for his lecture to be published in form of an article in the JIOS Journal. Uponreceiving the Russian version of his article named Sigma-notation and the equivalence of Pand NP classes, the Editorial Board had it translated into English and proceeded to havingit reviewed. The paper was sent to several renowned world experts in the field of Booleanfunctions, mathematical logic and algorithm theory for review. Yet, no response wasreceived from reviewers contacted although the Editorial Board and Dr. Telpiz made effortsfor access to all relevant papers, as well as the book itself, to be possible. Bearing in mindnot only the great relevance of P = NP problem but also the constant need for scientificideas and findings to be disseminated, the JIOS Editorial Board has decided to have Dr.Telpiz's paper published although it had not been officially reviewed, which the authorhimself has consented to in writing. Owing to its inclusion in this issue, the paper is beingpresented to a wider scientific and professional audience who are thus given an opportunityto both consider and assess it from their own perspective.Editors2012-03-15T13:05:31+01:00https://jios.foi.hr/index.php/jios/article/view/236SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS2012-03-15T12:55:41+01:00Marijana Zekić-Sušacmarijana@efos.hrNataša Šarlijanatasa@efos.hrMirta Benšićmirta@mathos.hrAfter production and operations, finance and investments are one of the mostfrequent areas of neural network applications in business. The lack of standardizedparadigms that can determine the efficiency of certain NN architectures in a particularproblem domain is still present. The selection of NN architecture needs to take intoconsideration the type of the problem, the nature of the data in the model, as well as somestrategies based on result comparison. The paper describes previous research in that areaand suggests a forward strategy for selecting best NN algorithm and structure. Since thestrategy includes both parameter-based and variable-based testings, it can be used forselecting NN architectures as well as for extracting models. The backpropagation, radialbasis,modular, LVQ and probabilistic neural network algorithms were used on twoindependent sets: stock market and credit scoring data. The results show that neuralnetworks give better accuracy comparing to multiple regression and logistic regressionmodels. Since it is model-independant, the strategy can be used by researchers andprofessionals in other areas of application.2012-03-15T12:55:41+01:00https://jios.foi.hr/index.php/jios/article/view/235ESSENTIAL CHARACTERISTICS OF AN ERP SYSTEM : CONCEPTUALIZATION AND OPERATIONALIZATION2012-03-15T12:50:10+01:00Sylvestre Uwizeyemungu{sylvestre_uwizeyemungu@uqtr.caLouis Raymondouis_raymond@uqtr.caThe interest of firms in ERP systems has been echoed in both the scientific andprofessional literature. It is worth noting however that while this literature has becomeincreasingly abundant, there does not yet exist an operational definition of the ERP conceptthat is, if not unanimously, at least widely accepted. This constitutes a handicap for boththe research and practice communities. The present study outlines what could beconsidered as an ERP by first determining the essentially required characteristics of such asystem: integration, flexibility and transversality. Indicators are then provided in order tooperationalise these three characteristics. The study concludes by proposing a researchframework on the impact of an ERP’s key characteristics upon the performance of thesystem in a given organisational setting.2012-03-15T12:50:10+01:00https://jios.foi.hr/index.php/jios/article/view/234INDEPENDENT DE-DUPLICATION IN DATA CLEANING2012-03-15T12:45:50+01:00Ajumobi Udechukwuajumobiu@cpsc.ucalgary.caChristie Ezeifecezeife@cs.uwindsor.caKen Barkerbarker@cpsc.ucalgary.caMany organizations collect large amounts of data to support their business anddecision-making processes. The data originate from a variety of sources that may haveinherent data-quality problems. These problems become more pronounced whenheterogeneous data sources are integrated (for example, in data warehouses). A majorproblem that arises from integrating different databases is the existence of duplicates. Thechallenge of de-duplication is identifying “equivalent” records within the database. Mostpublished research in de-duplication propose techniques that rely heavily on domainknowledge. A few others propose solutions that are partially domain-independent. Thispaper identifies two levels of domain-independence in de-duplication namely: domainindependenceat the attribute level, and domain-independence at the record level. Thepaper then proposes a positional algorithm that achieves domain-independent deduplicationat the attribute level, and a technique for field weighting by data profiling,which, when used with the positional algorithm, achieves domain-independence at therecord level. Experiments show that the proposed techniques achieve more accurate deduplicationthan the existing algorithms.2012-03-15T12:45:49+01:00https://jios.foi.hr/index.php/jios/article/view/233WEB LOG EXPLORER – CONTROL OF MULTIDIMENSIONAL DYNAMICS OF WEB PAGES2012-03-15T12:39:31+01:00Mislav Šimunićmislavs@fthm.hrŽeljko Hutinskizeljko.hutinski@foi.hrMirko Čubrilomirko.cubrilo@foi.hrDemand markets dictate and pose increasingly more requirements to the supplymarket that are not easily satisfied. The supply market presenting its web pages to thedemand market should find the best and quickest ways to respond promptly to the changesdictated by the demand market. The question is how to do that in the most efficient andquickest way. The data on the usage of web pages on a specific web site are recorded in alog file. The data in a log file are stochastic and unordered and require systematicmonitoring, categorization, analyses, and weighing. From the data processed in this way, itis necessary to single out and sort the data by their importance that would be a basis for acontinuous generation of dynamics/changes to the web site pages in line with the criterionchosen. To perform those tasks successfully, a new software solution is required. For thatpurpose, the authors have developed the first version of the WLE (WebLogExplorer)software solution, which is actually realization of web page multidimensionality and theweb site as a whole. The WebLogExplorer enables statistical and semantic analysis of a logfile and on the basis thereof, multidimensional control of the web page dynamics. Theexperimental part of the work was done within the web site of HTZ (Croatian NationalTourist Board) being the main portal of the global tourist supply in the Republic of Croatia(on average, daily "log" consists of c. 600,000 sets, average size of log file is 127 Mb, andc. 7000-8000 daily visitors on the web site).2012-03-15T12:39:31+01:00https://jios.foi.hr/index.php/jios/article/view/232LOG FILE ANALYSIS AND CREATION OF MORE INTELLIGENT WEB SITES2012-03-15T12:20:08+01:00Mislav Šimunićmislavs@fthm.hrŽeljko Hutinskizeljko.hutinski@foi.hrMirko Čubrilomirko.cubrilo@foi.hrTo enable successful performance of any company or business system, both inthe world and in the Republic of Croatia, among many problems relating to its operationsand particularly to maximum utilization and efficiency of the Internet as a media forrunning business (especially in terms of marketing), they should make the best possible useof the present-day global trends and advantages of sophisticated technologies andapproaches to running a business. Bearing in mind the fact of daily increasing competitionand more demanding market, this paper addresses certain scientific and practicalcontribution to continuous analysis of demand market and adaptation thereto by analyzingthe log files and by retroactive effect on the web site. A log file is a carrier of numerousdata and indicators that should be used in the best possible way to improve the entirebusiness operations of a company. However, this is not always simple and easy. The websites differ in size, purpose, and technology used for designing them. For this very reason,the analytic analysis frameworks should be such that can cover any web site and at thesame time leave some space for analyzing and investigating the specific characteristicof each web site and provide for its dynamics by analyzing the log file records. Thoseconsiderations were a basis for this paper2012-03-15T12:20:08+01:00https://jios.foi.hr/index.php/jios/article/view/231A UML PROFILES FOR VIEWPOINT-ORIENTED MODELING2012-03-15T12:12:40+01:00Abdellatif Hairhair@fstbm.ac.maThe viewpoint-oriented modeling consists in providing an unique modelaccessible by users with various access rights according to their needs. The system isrepresented as sub-systems (called sub-models). This cutting makes the design of systemeasier by an autonomous design of its sub-systems.UML is a standard modeling language and supports extension mechanism to allowtailoring UML to fit the needs of a specific domain. UML Profile is a predefined set ofextension mechanisms. UML profile allows the stakeholders of a certain domain to expressthe semantics of their systems using a well-defined set of extensions. In this paper wepropose an initial discussion on UML profile for viewpoint oriented modeling, whichextends the standard UML by incorporating new concepts like views, viewpoints, flexible,visibility relationships, etc.2012-03-15T12:12:39+01:00https://jios.foi.hr/index.php/jios/article/view/230SIGMA-NOTATION AND THE EQUIVALENCE OF P AND NP CLASSES2012-03-15T12:07:28+01:00Miron I.Telpizmit@tarusa.ruThe aim of this paper is to show that –notation, based on the positionalityprinciple, doesn’t just answer the question of equivalence of P and NP problemclasses, but also represents the key to the solution of (some) more general problemsfrom the domain of multivalued logics. However, the achievement of such an aim inits full scope is hardly possible within the limits of this paper. Therefore, the followingplan shall be realized:Firstly, the logic algebra fragment necessary for the solution of the P and NPclasses equivalence problem shall be expounded.Secondly, the necessary symbols and definitions shall be introduced to show thatthe calculations in the domain of the multivalued logic can be directly executed withinthe framework of –notation.2012-03-15T12:07:09+01:00https://jios.foi.hr/index.php/jios/article/view/221Cover pages2012-03-15T12:57:14+01:00Neven Vrcekneven.vrcek@foi.hrHere you can download journal cover pages.2011-12-14T13:57:08+01:00https://jios.foi.hr/index.php/jios/article/view/220From the Editor2012-03-15T12:57:14+01:00Neven Vrcekneven.vrcek@foi.hr<p>Dear authors, readers and future authors,<br />It is my pleasure to present you the 2nd number of the 35th volume of the Journal of Information andOrganizational Sciences – JIOS.</p><p>In this issue a selection of 3 original scientific papers and 1 survey paper have been included, all of which have undergone a rigorous double-blind review process. Some of the papers published here were already presented at the CECIIS 2011 Conference held in Varaždin between 21st and 23rdSeptember 2011. These papers were nominated for publishing in JIOS by the chairs of the conference tracks they were presented at on the account of their research quality.</p><p>As in prior issues of the Journal, this one also comprises papers that cover themes from various ICT fields: computer programming, symbolic logic in the field of information sciences, business processes, management and other related themes. We hope that the variety of themes will draw the attentionof researchers in different ICT fields and motivate potential authors to expand the Journal’s thematic scope by other themes that may be of interest to the wider ICT research community.</p><p>I would like to use this opportunity to encourage prospective authors among you, dear readers, to submit papers at jios.foi.hr. You are also invited to share with us your comments or critical remarks regarding the papers previously published in the Journal. Further, we would appreciate yourwillingness to become a peer-reviewed for submitted papers and thus contribute significantly to the rising quality of JIOS.</p><p>So far JIOS has been indexed in eight well known databases and now this number has risen to nine, adding “Library, Information Science &amp; Technology Abstracts” to the database list. We are continuously investing a lot of effort to extend the list of databases where JIOS would be cited, in order to makethe published papers available to a larger readers’ audience, and give your research a greater impact factor.</p>2011-12-14T13:52:29+01:00https://jios.foi.hr/index.php/jios/article/view/213The Modeling and Complexity of Dynamical Systems by Means of Computation and Information Theories2012-03-15T12:57:14+01:00Robert Logozarrobert.logozar@velv.hrAlen Lovrencicalen.lovrencic@foi.hrWe present the modeling of dynamical systems and finding of their complexity indicators by the use of concepts from computation and information theories, within the framework of J. P. Crutchfield's theory of ε-machines. A short formal outline of the ε-machines is given. In this approach, dynamical systems are analyzed directly from the time series that is received from a properly adjusted measuring instrument. The binary strings are parsed through the parse tree, within which morphologically and probabilistically unique subtrees or morphs are recognized as system states. The outline and precise interrelation of the information-theoretic entropies and complexities emanating from the model is given. The paper serves also as a theoretical foundation for the future presentation of the DSA program that implements the ε-machines modeling up to the stochastic finite automata level.2011-12-14T12:52:32+01:00https://jios.foi.hr/index.php/jios/article/view/208The rôle of linear logic in coalgebraical approach of computing2012-03-15T12:57:14+01:00Viliam Slodičákviliam.slodicak@tuke.skPavol Mackopavol.macko@tuke.skLinear logic provides a logical perspective on computational issues such as control of resources and order of evaluation. The most important feature of linear logic is that formulae are<br />considered as actions. While classical logic treats the sentences that are always true or false, in linear logic it depends on an internal state of a dynamic system. Curry-Howard correspondence is a correspondence between logic and computing in informatics. In this contribution we present two ways of computations which correctness we prove by Curry-Howard correspondence. We show a standard way and a new way of computing based on hylomorphism by using coalgebras which is an alternative method. Our method of recursive and corecursive computations we apply in simple authentication system.2011-12-14T12:52:27+01:00https://jios.foi.hr/index.php/jios/article/view/206Transition between process models (BPMN) and service models (WS-BPEL and other standards): A systematic review2012-03-15T12:57:14+01:00Marko Jurišićmjurisic@foi.hrBPMN and BPEL have become de facto standards for modeling of business processes and imple-mentation of business processes via Web services. There is a quintessential problem of discrep-ancy between these two approaches as they are applied in different phases of lifecycle and theirfundamental concepts are different — BPMN is a graph based language while BPEL is basicallya block-based programming language. This paper shows basic concepts and gives an overviewof research and ideas which emerged during last two years, presents state of the art and possiblefuture research directions. Systematic literature review was performed and critical review wasgiven regarding the potential of the given solutions.2011-12-14T12:52:22+01:00https://jios.foi.hr/index.php/jios/article/view/205Analysis of Top 500 Central and East European Companies Net Income Using Benford's Law2012-03-15T12:57:14+01:00Mario Žgelamario@hnb.hrJasminka Dobšajasminka.dobsa@foi.hr<p>There are numerous useful methods that can be conducted in data analysis in order to check data correctness and authenticity. One of contemporary and efficient methods is application of so-called Benford's Law. In this paper we examine ways of application of this law in investigation of specific net income number set. Our aim is to make a conclusion if this number set conforms to Benford's Law. An examination target focus is set on values of top 500 central and east European companies according to their income. Data set contains 1,500 records and spans through 3 years (2007, 2008 and 2009) including 500 net incomes per year. Research is based on net income profit and loss subsets as well as absolute values of net income. Analysis covers first digit Benford's Law test and proves conformance to Benford's Law of all observed subsets.</p>2011-12-14T12:52:00+01:00https://jios.foi.hr/index.php/jios/article/view/202Cover pages2011-06-27T10:15:52+02:00Neven Vrčekneven.vrcek@foi.hrHere you can download journal cover pages.2011-06-27T10:13:54+02:00https://jios.foi.hr/index.php/jios/article/view/169The position of teaching materials on the monitor and its effect on the e-learning success2011-06-27T11:09:22+02:00Janko Žufićjzufic@unipu.hrMaja Ružić Bafmaja@infosit.hrPredrag Zarevskipzarevsk@ffzg.hr<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--> <!--[endif]--> <p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} --> <!--[endif] --></p><p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><span style="font-size: 10pt;" lang="EN-GB">There are various elements in designing e-teaching materials that could have an impact in raising the efficiency of e-learning. This paper is based on the experiments aiming to investigate whether there are certain positions on the monitor in which students are able to better perceive and/or remember e-teaching materials. Our research was carried out at the Juraj Dobrila University of Pula. Participants were first year students attending the teacher education programme (aged 19.5 – 20.5). The research design included two pre-experimental groups and one experimental group. The monitor was virtually divided into 24 zones. Students read the teaching material displayed on the screen; in each reading four texts in different positions were used. The relative ease/difficulty of remembering the text was taken into account by introducing different ponders to each text. Regarding the memory efficiency, our results show statistically significant differences between certain screen positions (these differences ranged from +29.6% to -42.6% from the average result). </span></p> <p class="MsoBodyText" style="margin: 0cm 17.85pt 0.0001pt;"><strong><span style="font-size: 10pt;" lang="EN-GB">Keywords: </span></strong><span style="font-size: 10pt;" lang="EN-GB">efficient e-learning, text position on the screen </span></p>2011-06-27T09:53:38+02:00https://jios.foi.hr/index.php/jios/article/view/186Comparison of Cloud backup performance and costs in Oracle database2011-07-02T06:35:31+02:00Aljaž Zrnecaljaz.zrnec@fri.uni-lj.siDejan Lavbičdejan.lavbic@fri.uni-lj.si<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SL</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:EnableOpenTypeKerning /> <w:DontFlipMirrorIndents /> <w:OverrideTableStyleHps /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} --> <!--[endif] --><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-US">Current practice of backing up data is based on using backup tapes and remote locations for storing data. Nowadays, with the advent of cloud computing a new concept of database backup emerges. The paper presents the possibility of making backup copies of data in the cloud. We are mainly focused on performance and economic issues of making backups in the cloud in comparison to traditional backups. We tested the performance and overall costs of making backup copies of data in Oracle database using Amazon S3 and EC2 cloud services. The costs estimation was performed on the basis of the prices published on Amazon S3 and Amazon EC2 sites.</span>2011-06-27T09:53:16+02:00https://jios.foi.hr/index.php/jios/article/view/195Service-oriented architectural framework for support and automation of collaboration tasks2011-06-27T10:15:53+02:00Ana Sasaana.sasa@fri.uni-lj.siMarjan Krispermarjan.krisper@fri.uni-lj.si<p class="Abstract">Due to more and more demanding requirements for business flexibility and agility, automation of end-to-end industrial processes has become an important topic. Systems supporting business process execution need to enable automated tasks execution as well as integrate human performed tasks (human tasks) into a business process. In this paper, we focus on collaboration tasks, which are an important type of composite human tasks. We propose a service-oriented architectural framework describing a service responsible for human task execution (Human task service), which not only implements collaboration tasks but also improves their execution by automated and semi-automated decision making and collaboration based on ontologies and agent technology. The approach is very generic and can be used for any type of business processes. A case study was performed for a human task intensive business process from an electric power transmission domain.</p>2011-06-27T09:52:54+02:00https://jios.foi.hr/index.php/jios/article/view/197Ontology-based knowledge management in service-oriented systems2011-06-27T10:15:52+02:00Ana Sasaana.sasa@fri.uni-lj.siMarjan Krispermarjan.krisper@fri.uni-lj.si<p class="Abstract">This paper proposes an innovative framework for knowledge management in service-oriented systems. An important novelty of our framework is that it allows for automatic instance level evolution of the knowledge base and that it integrates conceptual level knowledge base evolution with the overall service-oriented system framework. In the paper, we identify several opportunities that have arisen in the field of knowledge management with the wider acceptance of SOA and its technology stack, and we present a framework that addresses these opportunities. We focus on ontology-based knowledge management systems, which have become one of the most important technologies for implementation of knowledge management systems. The framework reduces the required input for knowledge management by knowledge engineers, increases information completeness in the knowledge base and provides a simple way for storing more up-to-date information in the knowledge base.</p>2011-06-27T09:52:31+02:00https://jios.foi.hr/index.php/jios/article/view/187Some useful structures for categorical approach for program behavior2011-06-27T10:15:52+02:00Viliam Slodičákviliam.slodicak@tuke.skUsing of category theory in computer science has extremely grown in the last decade. Categories allow us to express mathematical structures in unified way. Algebras are used for constructing basic structures used in computer programs. A program can be considered as an element of the initial algebra arising from the used programming language. In our contribution we formulate two ways of expressing algebras in categories. We also construct the codomain functor from the arrow category of algebras into the base category of sets which objects are also the carrier-sets of the algebras. This functor expresses the relation between algebras and carrier-sets.2011-06-27T09:52:12+02:00https://jios.foi.hr/index.php/jios/article/view/184Source Code Generator Based on Dynamic Frames2011-06-27T10:15:52+02:00Danijel Radoševićdanijel.radosevic@foi.hrIvan Magdalenicivan.magdalenic@foi.hr<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S), which describes the application characteristics, Configuration (C), which describes the rules for building applications, and Templates (T), which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T) until final code is produced. This approach is compared to existing XVCL frames based model for source code generating.</span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons.</span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><span style="font-family: &quot;Times New Roman&quot;,&quot;serif&quot;;" lang="EN-GB">The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.</span></p>2011-06-27T09:51:53+02:00https://jios.foi.hr/index.php/jios/article/view/180Unlearning/Relearning in Processesof Business Information Systems Innovation2011-06-27T10:37:15+02:00Maurizio Pighinmaurizio.pighin@uniud.itAnna Marzonaanna.marzona@uniud.it<span style="font-family: 'Times New Roman';"><span style="font-size: 15px;">Unlearning is defined as throwing away concepts learnt in the past to give space for possible new learning. The learning process that supports deep change should be composed by different unlearning-learning phases, both at the individual level and at a more general organizational level. Must unlearning and relearning concepts be explicitly considered in business process reengineering based on the reorganization of information systems? This paper tries to answer this question, by describing the impact of change in information systems on the knowledge model of an organization. The analysis of a recent case study of information systems innovation, permit us to highlight common deficiencies in the design of information systems reengineering processes, particularly in SME. The paper ends with the suggestion of “good practices” that could permit the success of innovation processes by reducing the risk of failure due to excessive resistance to change.<br /></span></span>2011-06-27T09:51:29+02:00https://jios.foi.hr/index.php/jios/article/view/174Proposing methodology pattern for measuring public value of IT projects2011-06-27T10:15:52+02:00Dinko Kancijandinko.kancijan@novi-net.netNeven Vrčekneven.vrcek@foi.hr<span style="font-family: &quot;Times New Roman&quot;; font-size: 11pt; mso-ansi-language: EN-GB; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-GB">The assessment of the acceptability and the value of IT projects in the public sector, especially when the projects feature the qualitative value along with the monetary one, is a complex problem. There are certain methodologies in the world though that help various organizations in decision-making process when projects are being chosen. The paper surveys the three IT projects public value assessing methodologies: the American Value Measuring Methodology, the French MAREVA, and the German WiBe. A comparison of the approaches to solving the problem of assessing public value of IT projects was thus made. The Analytic Hierarchy Process &ndash; a method of a multicriteria analysis of alternatives-was briefly presented. By the use of the Hierarchy Criteria Model in the way that respects all the basic characteristics that a methodology of the kind should feature in accordance with Gartner, a proposition of an IT project public value measurement methodology pattern was presented. The selection of projects with little value contribution if compared to the existing situation, the assessment of the acceptability of risk through the hierarchy structure of the value of a project and the aggregation of the value of separate PVIT dimensions is a contribution related to the methodology patterns that were surveyed.</span>2011-06-27T09:50:52+02:00https://jios.foi.hr/index.php/jios/article/view/182The impact of Game-based learning on the achievement of learning goals and motivation for learning mathematics - literature review2011-06-27T10:15:52+02:00Blaženka Divjakbdivjak@foi.hrDamir Tomićdamir@ufos.hr<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML /> <o:AllowPNG /> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SH</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val="&#45;-" /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--> <p class="MsoNormal" style="margin: 0cm 18.15pt 0.0001pt; text-align: justify;"><span style="font-size: 10pt;" lang="EN-GB">Information technologies are an integral part of a contemporary society which bases its progress on knowledge being one goal of education. Beside acquiring knowledge, skills and routines, the goal of education is to create a complete individual who can rationally and timely make decisions, purposefully react in new situations and be trained for life-long learning. In order to accomplish all this, it is necessary to make educational process more creative, contemporary and adjusted to new generations of computer literate pupils who demand quicker and more frequent interactions, a lot of information at the same time, generations who quickly acquire rules of computer games. Computer games meeting pedagogical criteria should become an integral part of learning. Teaching with mathematical computer games, which fulfil pedagogical criteria, influences pupils&rsquo; motivation, learning, retention and forgetting. This paper provides a review of literature in this field and determines whether the use of mathematical computer games contributes to more efficient realisation of educational goals at all level of education. Furthermore, considering prior research we have attempted to establish whether the use of mathematical games for teaching has an impact on the formation of a positive attitude of pupils of different ages toward the subject of mathematics, their motivation and knowledge acquisition when compared to learning without computer games. Finally, we have analysed different research methods concerning this issue and assessed the impact of pedagogically designed mathematical computer games on the realisation of educational goals and quality improvement of teaching and learning. </span></p>2011-06-27T09:50:33+02:00https://jios.foi.hr/index.php/jios/article/view/188An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence2011-06-27T10:26:14+02:00Jasmin Ćosićnoemail@noemail.comZoran Ćosićnoemail@noemail.comMiroslav Bačamiroslav.baca@foi.hr<span style="font-family: 'Times New Roman', serif;"><span style="font-size: 15px;">Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digital investigations process. This paper deals with digital evidence and chain of custody of digital evidence. Authors definetaxonomy and use an ontological approach to manage chain of custody of digital evidence. The aim of this paper was to develop ontology to provide a new approach to study and better understand chain of custody of digital evidence . Additionally, developed ontology can be used as a method to further develop a set of standard and procedures for secure management with digital evidence.<br /></span></span>2011-06-27T09:49:57+02:00https://jios.foi.hr/index.php/jios/article/view/166Towards more efficient e-learning, intelligence and adapted teaching material2010-12-16T11:38:09+01:00Janko Žufićjzufic@unipu.hrDamir Kalpićdamir.kalpic@fer.hr<p class="Abstract"><span lang="EN-US">This article presents results of a research project in which we attempted to determine the relationship between efficient E-learning and teaching materials adapted based on students&rsquo; structure of intelligence.</span></p> <p class="Abstract"><span lang="EN-US">The project was conducted on approximately 500 students, 23 classes, nine elementary schools, with ten teachers of history, informatics and several licensed psychologists. E-teaching material was prepared for the subject of History for eight-grade students of elementary school.</span></p> <p class="Abstract"><span lang="EN-US">Students were tested for the structure of intelligence, and based on their most prominent component, they were divided into groups, using teaching materials adapted to their most prominent intelligence component. The results have shown that use of the adapted teaching materials achieved 6-12% better results than E-materials not adapted to students&rsquo; structure of intelligence.</span></p>2010-12-14T09:57:37+01:00https://jios.foi.hr/index.php/jios/article/view/175Determining semantic similarity of it systems based on the comparison of their graphical data models2010-12-14T10:52:05+01:00Katarina Tomicic-Pupekktomicic@foi.hr<p>Modelling is the basis for research and development of IT systems. Graphical models and graphic representations of models originally built in non-graphic languages and formalisms are often used. In modelling IT systems a need exists for comparing graphical models which can represent different variations of the same or similar modelled content or graphical models which, with certain revisions, could be applied in various domains. Graphical model in the latter case first needs to be translated into another form of predicate expressions or formal languages of modelled content representation. The lack of translation of the model for comparison is a time-consuming venture and may result in the loss of modelled relations due to differences in the "language" and representation symbols. <br />The goal of the paper is to explore and propose methods and procedures for determining similarities of IT systems based on the comparison of their graphical data models. The procedure of determining the similarities of graphical data models of the same type shall at the end of my research be based on semantic and structural similarity of models. In this article procedures for determining semantic similarity and their application is discussed together with examples and the procedure for determining structural similarity is proposed in roughly as it is in the finishing state of current research activities.</p>2010-12-14T09:55:50+01:00https://jios.foi.hr/index.php/jios/article/view/140Online privacy: overview and preliminary research2010-12-14T10:52:05+01:00Renata Mekovecrenata.hudek@foi.hr<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; mso-style-unhide:no; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--> <p class="Abstract" style="margin: 0cm 18.15pt 0.0001pt;">Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users&rsquo; online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of <em>information privacy</em> and concerned with the way users&rsquo; personal information is collected, saved and used by an online company. This article&rsquo;s main aim is to provide an overview of numerous Internet users&rsquo; privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed.</p><p>&nbsp;</p>2010-12-14T09:55:06+01:00https://jios.foi.hr/index.php/jios/article/view/137An Approach to Optical Network Design using General Heuristic Optimization Framework2010-12-14T10:52:05+01:00Marko Lackovićmarko.lackovic@ieee.org<p class="Abstract">The article tackles the problem of optimization methods in optical network design process, based on optimal traffic routing with the goal to minimize the utilized network resources for given topology and traffic demands. An optimization framework <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> has been developed with the focus on flexibility in solving optimization problems by implementing general heuristic search techniques. <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> modular organization has been described, including coding types for solutions and genetic algorithm as the optimization method. Optimal routing has been implemented to demonstrate the use of <strong style="mso-bidi-font-weight: normal;"><em style="mso-bidi-font-style: normal;">Nyx</em></strong> in the optical network design process. Optimal routing procedure has been applied to Pan-European optical network with variations of routing procedures and the number of wavelengths. The analysis included no protection scenario, 1+1 protection and path restoration. The routing was performed using shortest path routing and optimal routing which minimizes the use of optical network resources, being network multiplexers, amplifiers and fibers.</p><p> </p><p> </p>2010-12-14T09:52:56+01:00https://jios.foi.hr/index.php/jios/article/view/176Social network analysis of Eureka project partnership in Central and South-Eastern European regions2010-12-14T10:52:05+01:00Blaženka Divjakblazenka.divjak@foi.hrPetra Pehardappeharda@foi.hrNina Begičevićnina.begicevic@foi.hr<span style="font-family: 'Times New Roman', serif; font-size: medium;"><span style="font-size: 15px;">In this article we present research on the social network structure of project partnership in the Eureka network in order to understand country performance in the network. The main method used in our research is the Social Network Analysis (SNA). Research questions were set and examined on the set of the Central and South-Eastern European countries. We investigated regionally based partnerships, relation between central position in the network and country&rsquo;s level of development and, finally, in order to analyze relation between number of project partners and project success, Eureka success stories were investigated as well.</span></span>2010-12-14T09:52:17+01:00https://jios.foi.hr/index.php/jios/article/view/141Strategic Analysis and Model Construction on Conflict Resolution with Motion Game Theory2010-06-30T15:40:33+02:00Chih-Yao Lojacklo@ydu.edu.twYu-Teng Changcyt@ydu.edu.twThis research uses the &ldquo;Participating Observation Method&rdquo; to observe the interaction between manufacturer and distributor negotiation strategies, determine the preference and expectation of participants, and establish a framework for this type of research. Then it sets up the &ldquo;analysis framework of negotiation strategies&rdquo; between the manufacturer and the distributor based on an analysis of the respective conditions, advantages, and disadvantages of the manufacturer and distributor. Thirdly, this study sets up a reward matrix of the strategy action game between the manufacturer and the distributor. Then establishes a set of feasible &ldquo;negotiation models&rdquo; based on the reward matrix of the strategy game between the both parties to observe how the manufacturer and the distributor make their own bargaining decisions in the situation of information asymmetry or exterior opportunity/threat. Finally, this study establishes a &ldquo;multi-agent strategy game protocol system model&rdquo; to solve the conflict resulting from the self-strategizing of both parties for their own interests, and to achieve the utmost efficiency in the negotiation.2010-06-30T15:19:14+02:00https://jios.foi.hr/index.php/jios/article/view/163Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA)2010-06-30T15:40:32+02:00Martin Kardosmartin.kardos@fri.uniza.skMatilda Drozdovámatilda.drozdova@fri.uniza.skInformation system&rsquo;s models on higher level of abstraction have become a daily routine in many software companies. The concept of Model Driven Architecture (MDA) published by standardization body OMG1 since 2001 has become a concept for creation of software applications and information systems. MDA specifies four levels of abstraction: top three levels are created as graphical models and the last one as implementation code model. Many research works of MDA are focusing on the lower levels and transformations between each other. The top level of abstraction, called Computation Independent Model (CIM) and its transformation to the lower level called Platform Independent Model (PIM) is not so extensive research topic. Considering to a great importance and usability of this level in practice of IS2Keywords: transformation, MDA, CIM, PIM, UML, DFD. development now our research activity is focused to this highest level of abstraction &ndash; CIM and its possible transformation to the lower PIM level. In this article we are presenting a possible solution of CIM modeling and its analytic method of transformation to PIM.2010-06-30T15:18:30+02:00https://jios.foi.hr/index.php/jios/article/view/158Automatically Generated Keywords: A Comparison to Author-Generated Keywords in the Sciences2010-06-30T15:40:32+02:00Charlie D. Hurtcdhurt@acm.org<p style="margin: 0px; text-indent: 0px;">This paper examines the differences between author-generated keywords and automatically generated keywords in one area of scientific and technical literature. Using inverse frequency, keywords produced using both methods are examined using a maximum likelihood algorithm. By reducing the scope and size of the corpus of literature examined, this study more closely emulates the information gathering processes of scientists and technologists. Care was taken in developing the sample used, balancing statistical factors to allow interpretable outcomes and replication. The results of the study indicated there are no statistically significant differences between the two techniques.<!--EndFragment--></p>2010-06-30T15:17:59+02:00https://jios.foi.hr/index.php/jios/article/view/157Describing Layered Communication Architecture in SDL Markup Language2010-06-30T15:40:32+02:00Marina Bagic Babacmarina.bagic@fer.hrMarijan Kunštićmarijan.kunstic@fer.hrDragan Jevtićdragan.jevtic@fer.hrUsing Specification and Description Language (SDL) as a formal language for specification of requirements for the complex, real-time and distributed systems involving many concurrent activities, we have come to the idea of making the language independent of platforms and operating systems which may use it. Shortly, we have developed markup version of the SDL language, and named it SDL Markup Language. It is an XML-based version of the SDL-PR (Phrase Representation), an SDL textual notation. We use the language to specify the complex communications protocols, which are used in wide range of layered architectures. We provide the specification from the INRES protocol in SDL-ML.2010-06-30T15:16:59+02:00https://jios.foi.hr/index.php/jios/article/view/152eTourism: A comparison of online and offline bookings and the importance of hotel attributes2010-06-30T15:40:32+02:00Igor H. Crnojevacigor.crnojevac@alh.hrJadranka Gugićjadranka.gugic@zsm.hrSaša Karlovčansasa.karlovcan@proago.hrInternet is an important tool for information searching and purchasing of products especially in tourism. This paper investigates the impact of demographic and travel characteristics of hotel guests on online and offline reservations. It also examines the importance of hotel attributes in selecting a hotel and the differences in priorities between guests who book their accommodation online and offline. Data was collected by surveys of guests in three hotels in Dubrovnik. The results of the study showed that the method of booking mostly depends on the nature of travel, and that the importance of hotel attributes does not differ much between different groups of guests.2010-06-30T15:16:23+02:00https://jios.foi.hr/index.php/jios/article/view/150Social network analysis of study environment2010-06-30T15:40:32+02:00Blaženka Divjakbdivjak@foi.hrPetra Pehardappeharda@foi.hrStudent working environment influences student learning and achievement level. In this respect social aspects of students&rsquo; formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA) that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time), attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network) were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.2010-06-30T15:16:09+02:00https://jios.foi.hr/index.php/jios/article/view/146Theoretical difference between impact factor and influence factor2010-06-30T15:40:33+02:00Đilda Pečarićdpecaric@ffzg.hrMiroslav Tuđmanmtudman@ffzg.hr<span style="font-family: 'Times New Roman'; font-size: medium;"><span style="font-size: 15px;">Bibliometric constructions of "knowledge maps" and "cognitive structures of science" do not differentiate between impact and influence factors. The difference can be constructedaccording to different meaning and interpretation of the terms reference and citation. Reference is "acknowledgment which one author gives to another", whereas citation is "acknowledgment which one document receives from another". Development of Information Science according to period and subject area is analyzed on the corpus of citation literature retrieved from doctoral dissertations in Information Science from 1978 to 2007 at Croatian universities. The research aim is to indicate the difference between document impact factor and author's influence factor (i.e. reference ability to produce effects on actions, behavior, and opinions of authors of doctoral theses). The influence factor serves to distinguish the key role of cited authors in time and according to the duration of the influence (the average age for cited papers of dominant authors in different periods is between eight and ten years). The difference between linear and interactive communication seems vital for the interpretation of cited half-life, i.e. the attitude of one science community towards used information resources and cognitive heritage. The analyzed corpus of 22,210 citations can be divided into three communication phases according to influence factor criteria: in the phase of dialogue and interactive communication 25% of bibliographic units are cited in the first four years; in the second phase another 25% of units are cited from the fifth to the ninth year; after ten years, in the dominant linear communication phase, approximately 30% of units are cited.</span></span>2010-06-30T15:14:45+02:00https://jios.foi.hr/index.php/jios/article/view/145Personal Efficacy and Factors of Effective Learning Environment in Higher Education: Croatian and American Students2010-06-30T15:40:33+02:00Violeta Vidaček - Hainšvvidacek@foi.hrHarry Pratspratshj@ucmail.uc.eduVictoria Appatovaappatovs@ucmail.uc.eduSuccessful learning in higher education incorporates various factors related to knowledge, skills, habits, and motivation. Additionally, students&rsquo; personalities and self-efficacy may contribute to their adjustment, planning of activities, and achieving success. The objective of this paper is to analyze students&rsquo; needs for support services, which enhance the effectiveness of their learning environment at higher education institutions. Answers received from a sample of undergraduate freshmen at one American University and one Croatian University were analyzed and compared. The students from both countries agree that there is a need for developing self-reliance and personal responsibility in using support services, as well as for the timely and accurate information on availability of these services. Students&rsquo; suggestions and their desire to enhance effectiveness of their learning environment may be used in creating and improving support services in higher education institutions as well as training their staff.2010-06-30T15:14:00+02:00https://jios.foi.hr/index.php/jios/article/view/144Syntactic Method for Vehicles Movement Description and Analysis2010-06-30T15:40:33+02:00Marcin Staniekmarcin.staniek@polsl.plJan Piechajan.piecha@polsl.pl<span style="font-family: 'Times New Roman', serif; font-size: medium;"><span style="font-size: 15px;">The syntactic primitives and the description language can be used for assignment and analysis of vehicles movement. The paper introduces a method that allows spotting vehicles&rsquo; manoeuvres on and between traffic lanes, observing images, registered by a video camera. The analysis algorithms of the vehicles&rsquo; movement trajectories were considered in this paper as well.</span></span>2010-06-30T15:13:15+02:00https://jios.foi.hr/index.php/jios/article/view/139Fuzzy Linguistic Optimization on Multi-Attribute Machining2010-06-30T15:40:33+02:00Tian-Syung Lantslan@ydu.edu.twChen-Feng Wucfwu@ydu.edu.twMing-Yung Wangmywang@ttu.edu.twChih-Yao Lojacklo@ydu.edu.twMost existing multi-attribute optimization researches for the modern CNC (computer numerical control) turning industry were either accomplished within certain manufacturing circumstances, or achieved through numerous equipment operations. Therefore, a general deduction optimization scheme proposed is deemed to be necessary for the industry. In this paper, four parameters (cutting depth, feed rate, speed, tool nose runoff) with three levels (low, medium, high) are considered to optimize the multi-attribute (surface roughness, tool wear, and material removal rate) finish turning. Through FAHP (Fuzzy Analytic Hierarchy Process) with eighty intervals for each attribute, the weight of each attribute is evaluated from the paired comparison matrix constructed by the expert judgment. Additionally, twenty-seven fuzzy control rules using trapezoid membership function with respective to seventeen linguistic grades for each attribute are constructed. Considering thirty input and eighty output intervals, the defuzzifierion using center of gravity is thus completed. The TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) is moreover utilized to integrate and evaluate the multiple machining attributes for the Taguchi experiment, and thus the optimum general deduction parameters can then be received. The confirmation experiment for optimum general deduction parameters is furthermore performed on an ECOCA-3807 CNC lathe. It is shown that the attributes from the fuzzy linguistic optimization parameters are all significantly advanced comparing to those from benchmark. This paper not only proposes a general deduction optimization scheme using orthogonal array, but also contributes the satisfactory fuzzy linguistic approach for multiple CNC turning attributes with profound insight.2010-06-30T15:12:13+02:00https://jios.foi.hr/index.php/jios/article/view/132Generic icons – yes or no?2010-07-02T09:08:59+02:00Krunoslav Bedikrunoslav.bedi@ck.t-com.hrNikolina Žajdela Hrusteknikolina.zajdela@foi.hrThe information society has become increasingly dependant on programs that are subjected to frequent evolutive, basic and logical changes for a variety of reasons whereas the visual design of the program/program interface mostly remains the same or gets slightly modified. The development of technology has become to such an extent a commonplace that the use of redesigned programs implies icons that are visually acceptable although representing obsolete technologies and that are eventually hard to change due to the habits developed by the program users. The research presents a study into the personal preference as to a particular icon, &ldquo;Save&rdquo; for example, and into the perception of the visual identities of today's programs under the circumstance of program icons being not compliant with the technological state-of-the-art. Based on the obtained results, the survey that included students attending web design and media technician courses and ECDL course participants who come in contact with computers and programming tools for the first time should enlighten both teachers and designers of programming interfaces about the way of linking the formal knowledge with a constructivist approach to designing and redesigning programs.2010-06-30T15:11:17+02:00https://jios.foi.hr/index.php/jios/article/view/129Considering Interactions among Multiple Criteria for the Server Selection2010-06-30T15:40:32+02:00Vesna Čančervesna.cancer@uni-mb.siDecision-making about server selection is one of the multi-criteria decision-making (MCDM) processes where interactions among criteria should be considered. The paper introduces and develops some solutions for considering interactions among criteria in the MCDM problems. In the frame procedure for MCDM by using the group of methods, based on assigning weights, special attention is given to the synthesis of the local alternatives&rsquo; values into the aggregate values where the mutual preferential independence between two criteria is not assumed. Firstly, we delineate how to complete the additive model into the multiplicative one with synergic and redundancy elements in the case that criteria are structured in one level and in two levels. Furthermore, we adapted the concept of the fuzzy Choquet integral to the multi-attribute value theory. Studying and comparing the results of the example case of the server selection obtained by both aggregation approaches, the paper highlights the advantages of the first one since it does not require from decision makers to determine the weights of all possible combinations of the criteria and it enables the further use of the most preferred MCDM methods.2010-06-30T15:10:14+02:00https://jios.foi.hr/index.php/jios/article/view/117Model-Driven Analysis towards Interoperability of Assessments in LMS2010-06-30T15:40:32+02:00Zuzana Bizonovazuzana.bizonova@fri.uniza.skKatarina Pilatovakatarina.pilatova@fri.uniza.skIn this article we are focusing on interoperability of two aspects of LMS systems - test question types and assessments as such. The proposed strategy is based on MDA, especially on the Platform Independent Models (PIM). On the higher level of abstraction (PIM) it is possible to find commonalities and differences of architectures of various systems and these are the basis for the common generalized model of the assessments. In the three steps methodology we are adding specificities of PIM models of candidate systems with various architecture &ndash; Moodle, Olat and Claroline. The correctness of the final common model (General PIM) is proved in the implemented system for exchange of tests between the existing systems.2010-06-30T15:08:28+02:00https://jios.foi.hr/index.php/jios/article/view/123Multi-Agent System for Decision Support in Enterprises2009-12-15T12:17:17+01:00Dejan LavbičDejan.Lavbic@fri.uni-lj.siRok RupnikRok.Rupnik@fri.uni-lj.si<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML /> <o:AllowPNG /> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>SL</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> <w:UseFELayout /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 415 0;} @font-face {font-family:Cambria; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1073741899 0 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0cm; margin-right:0cm; margin-bottom:10.0pt; margin-left:0cm; text-align:justify; text-justify:inter-ideograph; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Cambria","serif"; mso-ascii-font-family:Cambria; mso-ascii-theme-font:major-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:major-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:major-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:major-bidi; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-ascii-font-family:Cambria; mso-ascii-theme-font:major-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:major-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:major-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:major-bidi; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:35.4pt; mso-footer-margin:35.4pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} --> <!--[endif]--><span style="font-size: 11pt; line-height: 115%; font-family: " lang="EN-US">Business decisions must rely not only on organisation’s internal data but also on external data from competitors or relevant events. This information can be obtained from the Web but must be integrated with the data in an organisation’s Data Warehouse (DW). In this paper we discuss the agent-based integration approach using ontologies. To enable common understanding of a domain between people and application systems we introduce business rules approach towards ontology management. Because knowledge in organisation’s ontologies is acquired from business users without technical knowledge simple user interface based on ontology restrictions and predefined templates are used. After data from internal DW, Web and business rules are acquired; agent can deduce new knowledge and therefore facilitate decision making process. Tasks like information retrieval from competitors, creating and reviewing OLAP reports are autonomously performed by agents, while business users have control over their execution through knowledge base in ontology. The approach presented in the paper was verified on the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones and its accessories.</span>2009-12-15T11:17:51+01:00https://jios.foi.hr/index.php/jios/article/view/122Impact of ICT on the structural and contextual organizational elements: Case of the Varaždin County2009-12-15T12:17:17+01:00Kristina Brodarkristina.brodar@foi.hrMarina Klačmer Čalopamarina.klacmer@foi.hrIgor Pihirigor.pihir@foi.hr<p class="Abstract" style="margin: 0cm 18pt 0pt;"><span lang="EN-US"><span style="font-size: x-small; font-family: Times New Roman;">The influence of certain factors on the organizational components has been in researchers' focus for years, together with their impact on the overall organizational efficiency. Traditional view commonly divided the factors on internal and external ones, which became improper in modern conditions. With contemporary division on structural and contextual factors, as a specific determinant we have to extract information and communication technology (ICT) which impacts elements of structural and contextual dimension in every organization. Therefore it is becoming generic factor which cannot be classified into one of these groups. In this research, we observed impact of ICT on organizational elements of public administrations offices on the case of the Varaždin County. Results show that this impact is present in various forms in all observed factors and thus makes ICT a generic organizational factor. </span></span></p>2009-12-15T11:17:36+01:00https://jios.foi.hr/index.php/jios/article/view/121Creating an effective learning environment through an E-Learning Instructional Programme (ELIP)2009-12-15T12:21:53+01:00Maria Jakovljevicmaria.jakovljevic@wits.ac.zaThough numerous research reports have provided a body of information about benefits of e-learning there are barriers such as, asynchronous communication channels, lack of personalisation, which decrease the level of interaction between the learner and instructor [13].<br /><br />The aim of this paper is to discuss and outline a framework on e-learning pedagogical and technology issues which provide a basis for the creation of an e-learning instructional programme (ELIP). The Phase I of this research start with the creation of a framework for an e-learning environment and derivation of the e-learning instructional programme (ELIP); Phase II is aimed to implement a popular audio playback device (iPod) and VoIP. In this phase 40 learners, one instructor and three tutors will be observed and their experiences will be evaluated through focus group interviews and documents analysis. This research was based on a qualitative research approach [78],[44].<br />2009-12-15T11:17:27+01:00https://jios.foi.hr/index.php/jios/article/view/118PNMBG: Point Neighborhood Merging with Border Grids2009-12-15T12:17:17+01:00Renxia Wanxxrrww2002@163.comJingchao Chenjc_chen@dhu.edu.cnLixin Wangwlx@mail.dhu.edu.cnXiaoke Susuxiaoke@mail.dhu.edu.cn<span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">The special clustering algorithm is attractive for the task of grouping arbitrary shaped database into several proper classes. Up to now, a wide variety of clustering algorithms designed for this task have been proposed, the majority of these algorithms is density-based. But the effectivity and efficiency still is the great challenges for these algorithms as far as the clustering quality of such task is concerned. </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">In this paper, we</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US"> propose an arbitrary shaped clustering method with border grids (PNMBG),</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> is a crisp partition method. It groups objects </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">to point neighborhoods</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> first</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">ly</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">, and then</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">iterati</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">vely</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> merges</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> these </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">point neighborhoods</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> into </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">clusters</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">via</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> grids</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">, only bordering grids are considered during the merging stage. </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">Experiments show that </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> has a good efficiency </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">especially</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> on the database with high dimension. In general, </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold;" lang="EN-US">PNMBG</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US"> outperforms DBSCAN in the term of efficiency</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> and has an almost same </span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">effectivity</span><span style="font-size: 11pt; font-family: &quot;Times New Roman&quot;; mso-bidi-font-size: 10.5pt; mso-fareast-font-family: 宋体; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US"> with the later.</span>2009-12-15T11:17:14+01:00https://jios.foi.hr/index.php/jios/article/view/114Suitability of Modern Software Development Methodologies for Model Driven Development2009-12-15T12:17:17+01:00Ruben Picekruben.picek@foi.hrAs an answer to today’s growing challenges in software industry, wide spectrum of new approaches of software development has occurred. One prominent direction is currently most promising software development paradigm called Model Driven Development (MDD). Despite a lot of skepticism and problems, MDD paradigm is being used and improved to accomplish many inherent potential benefits. In the methodological approach of software development it is necessary to use some kind of development process. Modern methodologies can be classified into two main categories: formal or heavyweight and agile or lightweight. But when it is a question about MDD and development process for MDD, currently known methodologies are very poor or better said they don't have any explanation of MDD process. As the result of research, in this paper, author examines the possibilities of using existing modern software methodologies in context of MDD paradigm.<br />2009-12-15T11:16:53+01:00https://jios.foi.hr/index.php/jios/article/view/112The Role of Knowledge Management in Mobile Marketing2009-12-15T12:17:17+01:00Neven Bosiljneven.bosilj@t-mobile.hrIvan Jurinjaki.jurinjak@gmail.com<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves /> <w:TrackFormatting /> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF /> <w:LidThemeOther>HR</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> <w:SplitPgBreakAndParaMark /> <w:DontVertAlignCellWithSp /> <w:DontBreakConstrainedForcedTables /> <w:DontVertAlignInTxbx /> <w:Word11KerningPairs /> <w:CachedColBalance /> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math" /> <m:brkBin m:val="before" /> <m:brkBinSub m:val=" " /> <m:smallFrac m:val="off" /> <m:dispDef /> <m:lMargin m:val="0" /> <m:rMargin m:val="0" /> <m:defJc m:val="centerGroup" /> <m:wrapIndent m:val="1440" /> <m:intLim m:val="subSup" /> <m:naryLim m:val="undOvr" /> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true" DefSemiHidden="true" DefQFormat="false" DefPriority="99" LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Normal" /> <w:LsdException Locked="false" Priority="9" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="heading 1" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8" /> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9" /> <w:LsdException Locked="false" Priority="39" Name="toc 1" /> <w:LsdException Locked="false" Priority="39" Name="toc 2" /> <w:LsdException Locked="false" Priority="39" Name="toc 3" /> <w:LsdException Locked="false" Priority="39" Name="toc 4" /> <w:LsdException Locked="false" Priority="39" Name="toc 5" /> <w:LsdException Locked="false" Priority="39" Name="toc 6" /> <w:LsdException Locked="false" Priority="39" Name="toc 7" /> <w:LsdException Locked="false" Priority="39" Name="toc 8" /> <w:LsdException Locked="false" Priority="39" Name="toc 9" /> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption" /> <w:LsdException Locked="false" Priority="10" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Title" /> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font" /> <w:LsdException Locked="false" Priority="11" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtitle" /> <w:LsdException Locked="false" Priority="22" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Strong" /> <w:LsdException Locked="false" Priority="20" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Emphasis" /> <w:LsdException Locked="false" Priority="59" SemiHidden="false" UnhideWhenUsed="false" Name="Table Grid" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text" /> <w:LsdException Locked="false" Priority="1" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="No Spacing" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 1" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 1" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 1" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 1" /> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision" /> <w:LsdException Locked="false" Priority="34" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="List Paragraph" /> <w:LsdException Locked="false" Priority="29" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Quote" /> <w:LsdException Locked="false" Priority="30" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Quote" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 1" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 1" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 1" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 1" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 1" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 2" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 2" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 2" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 2" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 2" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 2" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 2" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 2" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 2" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 3" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 3" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 3" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 3" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 3" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 3" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 3" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 3" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 3" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 4" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 4" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 4" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 4" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 4" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 4" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 4" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 4" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 4" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 5" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 5" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 5" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 5" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 5" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 5" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 5" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 5" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 5" /> <w:LsdException Locked="false" Priority="60" SemiHidden="false" UnhideWhenUsed="false" Name="Light Shading Accent 6" /> <w:LsdException Locked="false" Priority="61" SemiHidden="false" UnhideWhenUsed="false" Name="Light List Accent 6" /> <w:LsdException Locked="false" Priority="62" SemiHidden="false" UnhideWhenUsed="false" Name="Light Grid Accent 6" /> <w:LsdException Locked="false" Priority="63" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6" /> <w:LsdException Locked="false" Priority="64" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6" /> <w:LsdException Locked="false" Priority="65" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 1 Accent 6" /> <w:LsdException Locked="false" Priority="66" SemiHidden="false" UnhideWhenUsed="false" Name="Medium List 2 Accent 6" /> <w:LsdException Locked="false" Priority="67" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6" /> <w:LsdException Locked="false" Priority="68" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6" /> <w:LsdException Locked="false" Priority="69" SemiHidden="false" UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6" /> <w:LsdException Locked="false" Priority="70" SemiHidden="false" UnhideWhenUsed="false" Name="Dark List Accent 6" /> <w:LsdException Locked="false" Priority="71" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Shading Accent 6" /> <w:LsdException Locked="false" Priority="72" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful List Accent 6" /> <w:LsdException Locked="false" Priority="73" SemiHidden="false" UnhideWhenUsed="false" Name="Colorful Grid Accent 6" /> <w:LsdException Locked="false" Priority="19" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis" /> <w:LsdException Locked="false" Priority="21" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis" /> <w:LsdException Locked="false" Priority="31" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference" /> <w:LsdException Locked="false" Priority="32" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Intense Reference" /> <w:LsdException Locked="false" Priority="33" SemiHidden="false" UnhideWhenUsed="false" QFormat="true" Name="Book Title" /> <w:LsdException Locked="false" Priority="37" Name="Bibliography" /> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading" /> </w:LatentStyles> </xml><![endif]--> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:238; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; mso-style-unhide:no; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> <p class="Abstract"><span lang="EN-US">Mobile terminal devices and mobile networks enable mass customization for individual customers, and pursuant to this mobile marketing represent the last stage of segmentation leading up to the individually customized marketing, i.e. „one on one marketing“. Mobile marketing refers to using an interactive wireless medium with purpose of providing customers with personal information, having time and location dimension, promoting goods, services and ideas, thus generating value for all stakeholders. On one hand, mobile medium has completely transformed present day notion of marketing campaigns and opened up a range of new opportunities for advertisers, and on the other hand it put new challenges before companies whose CRM and KM systems are not well adapted to new requirements of mobile marketing. This article attempts to answer the question on how to successfully run mobile marketing campaigns, while using tools and knowledge provided by Knowledge Management and Customer Relationship Management.</span></p>2009-12-15T11:16:27+01:00https://jios.foi.hr/index.php/jios/article/view/107Creating adaptive environment for e-learning courses2009-07-16T09:39:08+02:00Bozidar Radenkovicboza@myelab.netMarijana Despotovicmaja@myelab.netZorica Bogdanoviczorica@myelab.netDusan Baracdusan@myelab.netIn this paper we provide an approach to creating adaptive environment for e-learning courses. In the context of e-education, successful adaptation has to be performed upon learners’ characteristics. Currently, modeling and discovering users’ needs, goals, knowledge preferences and motivations is one of the most challenging tasks in e-learning systems that deal with large volumes of information. Primary goal of the research is to perform personalizing of distance education system, according to students’ learning styles. Main steps and requirements in applying business intelligence techniques in process of personalization are identified. In addition, we propose generic model and architecture of an adaptive e-learning system by describing the structure of an adaptive course and exemplify correlations among e-learning course content and different learning styles. Moreover, research that dealt with application of data mining technique in a real e-learning system was carried out. We performed adaptation of our e-learning courses using the results from the research.2009-07-01T14:32:20+02:00https://jios.foi.hr/index.php/jios/article/view/811957-2007: 50 Years of Higher Order Programming Languages2009-07-06T09:32:31+02:00Alen LovrenčićAlen.Lovrencic@foi.hrMario Koneckimario.konecki@foi.hrTihomir Orehovačkitihomir.orehovacki@foi.hr<p>Fifty years ago one of the greatest breakthroughs in computer programming and in the history of computers happened -- the appearance of FORTRAN, the first higher-order programming language. From that time until now hundreds of programming languages were invented, different programming paradigms were defined, all with the main goal to make computer programming easier and closer to as many people as possible. Many battles were fought among scientists as well as among developers around concepts of programming, programming languages and paradigms. It can be said that programming paradigms and programming languages were very often a trigger for many changes and improvements in computer science as well as in computer industry. Definitely, computer programming is one of the cornerstones of computer science.</p><p>Today there are many tools that give a help in the process of programming, but there is still a programming tasks that can be solved only manually. Therefore, programming is still one of the most creative parts of interaction with computers.</p><p>Programmers should chose programming language in accordance to task they have to solve, but very often, they chose it in accordance to their personal preferences, their beliefs and many other subjective reasons.</p><p>Nevertheless, the market of programming languages can be merciless to languages as history was merciless to some people, even whole nations. Programming languages and developers get born, live and die leaving more or less tracks and successors, and not always the best survives. </p><p>The history of programming languages is closely connected to the history of computers and computer science itself. Every single thing from one of them has its reflexions onto the other. This paper gives a short overview of last fifty years of computer programming and computer programming languages, but also gives many ideas that influenced other aspects of computer science. Particularly, programming paradigms are described, their intentions and goals, as well as the most of the significant languages of all paradigms. </p>2009-07-01T14:30:54+02:00https://jios.foi.hr/index.php/jios/article/view/90Web-based Systems Development: The Influence of Disciplinary Backgrounds on Design Practices2009-07-06T09:32:31+02:00Michael LangMichael.Lang@nuigalway.ieWeb development teams are multidisciplinary, bringing together designers from a variety of backgrounds. A Web designer’s professional training and education can shape his problem-solving orientation and world view by indoctrinating certain values and conditioning him to think and behave in certain ways. This paper presents an analysis of data gathered across 14 interviews, wherein four distinct orientations were identified: (1) Web development as the design of a functional software application (emphasis on back-end functionality); (2) as the design of an interactive tool (emphasis on ergonomics); (3) as the design of a communicational dialogue (emphasis on audience engagement); and (4) as an extension of branded graphic design (emphasis on visual presentation).2009-07-01T14:28:07+02:00https://jios.foi.hr/index.php/jios/article/view/109Linguistic competence in tertiary-level instruction in English and its relevance for student mobility2009-07-06T09:56:15+02:00Andreja Kovacicandreja.kovacic@foi.hrValentina Kirinicvalentina.kirinic@foi.hrBlazenka Divjakblazenka.divjak@foi.hrStudent and teacher mobility are important aspects of education within the Bologna Process. Overcoming the language barrier is a precondition for following and providing instruction in a foreign language. A survey was conducted among first-year undergraduate students to determine their readiness for instruction in English. The survey results show the respondent profile, their assessment of instruction within an English language course, using other ways of acquiring knowledge and self-assessment of their command of English. The students' self-assessment of motivation for learning English and its relevance for their profession are presented along with students' interest in other courses offered in English. It turns out that, regardless of a satisfactory level of self-assesed competence in English and motivation for learning English, students are not willing to enroll in the offered study courses in English. This may indicate that all the precoditions for mobility have not been fulfilled. The survey results are compared with the corresponding results of another, more comprehensive, survey among graduate students at the Faculty of Organization and Informatics conducted at the whole University of Zagreb. Althouh the results obtained in the two surveys are not identical, they roughly correspond. <br />2009-07-01T14:22:42+02:00https://jios.foi.hr/index.php/jios/article/view/97Integrating Six Sigma into a Quality Management System in the Medical Device Industry2010-01-13T16:29:24+01:00Nadica Hrgareknadica.hrgarek@gmail.comKerri-Anne Bowerskbowers@indicas.net<p><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--> Six Sigma is a valuable management strategy to improve business processes, reduce development and production costs, increase profit margin and improve customer satisfaction. The purpose of this paper is to describe how applicable Six Sigma concepts may complement and support formal quality management systems (QMS) in the medical device industry.</p><p>A significant number of issues, which increase the development costs and times, is often found during different phases of a medical device life cycle. Some defects with high patient safety risk may result in dangerous and very costly product recalls.</p><p>The basic idea of this paper is to explore the possibilities of integrating Six Sigma techniques with an existing QMS throughout the entire life cycle of a medical device. This paper addresses how Six Sigma techniques, when appropriately integrated into the QMS at medical device companies, can eliminate defects earlier in the medical device life cycle, identify major opportunities for cost savings, focus on customer needs and expectations, and improve the overall business processes.</p>2009-07-01T14:21:51+02:00https://jios.foi.hr/index.php/jios/article/view/87Web 2.1 : Toward a large and qualitative participation on the Web2009-07-06T09:32:32+02:00Boubker Sbihibsbihi@hotmail.comSiham El jazouliSihamjazouli@yahoo.frKamal Eddine El kadirielkadiri@uae.ma<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:HyphenationZone>21</w:HyphenationZone> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables /> <w:SnapToGridInCell /> <w:WrapTextWithPunct /> <w:UseAsianBreakRules /> <w:DontGrowAutofit /> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id=ieooui></object> <mce:style><! st1\:*{behavior:url(#ieooui) } --> <!--[endif]--> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:11.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} p.Abstract, li.Abstract, div.Abstract {mso-style-name:Abstract; margin-top:0cm; margin-right:18.0pt; margin-bottom:0cm; margin-left:18.0pt; margin-bottom:.0001pt; text-align:justify; mso-pagination:widow-orphan; font-size:10.0pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US; mso-fareast-language:EN-US;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> <!--[if gte mso 10]> <mce:style><! /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tableau Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} --> <!--[endif]--> <p class="Abstract"><span lang="EN-US">This article presents the results of research done on Web 2.0 within the School of Information Sciences ESI. It aims to study the behavior of different academic actors who deal with information, among whom we cite teachers, students of masters and students of information sciences in Morocco, face to Web 2.0’s services. </span></p> <p class="Abstract"><span lang="EN-US">Firstly, it aims to evaluate the use and production of information in the context of Web 2.0. Then, it<span> </span>attempts to assess those rates, to identify and analyze the causes of eventual problems and obstacles that academic actors face.<span> </span>In fact, we intend to understand why information actors in the academic world use often Web 2.0’s services but do rarely produce qualitative content.</span></p> <p class="Abstract"><span lang="EN-US">To achieve the objectives set, we used the on-site survey method, which was based on an electronic questionnaire administered directly to our people via the Internet. We chose the electronic version of questionnaire in order to make an optimal use in terms of new technologies, to gain time and to reduce cost. Then, in order to deepen the understanding of the data collected, we complete the data collected by the questionnaire by an ongoing discussions with actors.</span></p> <p class="Abstract"><span lang="EN-US">Finally, to overcome the problems already identified, we intend to propose the elements of a new version of the Web called Web 2.1 offering new concepts<span> </span>in order to encourage users to produce information of quality and make the Web more open to a larger community.</span></p> <p class="Abstract"><span lang="EN-US">This version maintains the current contents of<span> </span>Web 2.0 and adds more value to it. Indeed, the content will be monitored, evaluated and validated before being published. </span></p> <p class="Abstract"><span lang="EN-US">In order to target valuable information, the new version of Web 2.1 proposes to categorize users into three groups: users who just use the contents, producers who use and produce content, and<span> </span>validators<span> </span>who validate the content in order to<span> </span>target information that is validated and of good quality. Once the information is published, it must be well organized, well stored and archived or removed to avoid over-information.</span></p>2009-05-30T19:08:46+02:00https://jios.foi.hr/index.php/jios/article/view/94Interactions Validation Methods for Training Resources Control Engine Development2009-07-06T10:08:43+02:00Marcin Waldemar Bernaśmarcin.bernas@polsl.plJan Piechajan.piecha@polsl.plThe training courseware complexity proper selection is one of the most difficult factors looking from an intelligent application engine development. The application needs individual settings, the most relevant for the application structure matching to the users' individual expectations. What is more, the obtained structure allows controlling dynamically the application within a time it is used. The application units description with their controlling functions allow joining the database components into individual composition of the courseware. The paper in-troduces several aspects of distance learning resources development, fulfilling the demanding assumptions of the interactive training units. <br />2009-05-30T18:57:46+02:00https://jios.foi.hr/index.php/jios/article/view/98Double Separation Method for Translation of the Infrared Information into a Visible Area2009-07-06T09:32:32+02:00Ivana Žiljakivana.ziljak@zg.t-com.hrKlaudio Papklaudio.pap@zg.t-com.hrVilko Žiljakvilko.ziljak@zg.t-com.hrInformation visualization refers to the wavelength area ranging from 400 to 700 nm. Areas in lower wavelengths ranging from 100 to 400 nm are translated into the visual area with the goal to protect information visible only by applying instruments adapted for the ultraviolet area. Our recent research work refers to the infrared wavelength areas above the visible specter up to 1000 nm. The scientific contribution of this paper is in setting the double separation method for printing with CMYK printing inks with the goal to detect graphic information in the infrared area only. An algorithm has been created for making visual basics in the overall visible specter containing material that responds in the infrared section. This allows planning of areas in all coloring types for one and the same document that contains a secure piece of information. The system is based on double transition transformation of the visible RGB1 information recognition into CMYK2 in the same document. Secure information is recognized with the help of instruments in the set wavelength range. Most of the experiments have been carried out by analyzing the same set of RGB records. Each sample in the set was a test unit coming from another source containing different IR3 components. Thus an innovative method of color mixing has been set where colors appear respectively in daylight and separately according to IR light programming. New IR cryptography is proposed as shown in the experimental work. <br />2009-05-24T12:26:28+02:00https://jios.foi.hr/index.php/jios/article/view/100An Efficient Algorithm for Congestion Control in Highly Loaded DiffServ/MPLS Networks2009-07-06T09:48:50+02:00Srecko Krilesrecko.krile@unidu.hrDario Kresicdario.kresic@foi.hr<p class="MsoNormal" style="margin: 0cm 0cm 0pt; text-indent: 11.35pt;"><span style="font-family: Times New Roman;"><span style="font-size: 10pt; font-family: TimesNewRoman;">The optimal QoS path provisioning of coexisted and aggregated traffic in networks is still demanding problem. All traffic flows in a domain are distributed among LSPs (Label Switching Path) related to <em style="mso-bidi-font-style: normal;">N</em> service classes, but the congestion problem of concurrent flows can appear. As we know the IGP (Interior Getaway Protocol) uses simple on-line routing algorithms (e.g. OSPFS, IS-IS) based on shortest path methodology. In QoS end-to-end provisioning where some links may be reserved for certain traffic classes (for particular set of users) it becomes insufficient technique. On other hand, constraint based explicit routing (CR) based on IGP metric ensures traffic engineering (TE) capabilities. The algorithm proposed in this paper may find a longer but lightly loaded path, better than the heavily loaded shortest path. LSP</span><span style="font-size: 10pt;" lang="EN-US"> can be </span><span style="font-size: 10pt; mso-ansi-language: EN;" lang="EN">pre-computed</span><span style="font-size: 10pt;" lang="EN-US"> much earlier, possibly during SLA (Service Level Agreement) negotiation process. </span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-US"><span style="mso-spacerun: yes;"> </span></span><span style="font-size: 10pt;" lang="EN-US">As w</span><span style="font-size: 10pt; mso-bidi-font-family: Times; mso-ansi-language: HR;">e need firm </span><span style="font-size: 10pt;" lang="EN-US">correlation with</span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-GB"> bandwidth management and traffic engineering (TE) the </span><span style="font-size: 10pt;" lang="EN-US">initial (pro-active) routing can be </span><span style="font-size: 10pt; mso-ansi-language: EN;" lang="EN">pre-computed </span><span style="font-size: 10pt;" lang="EN-US">in the context of all priority traffic flows (former contracted SLAs) traversing the network simultaneously.</span><span style="font-size: 10pt; font-family: TimesNewRoman;"> </span><span style="font-size: 10pt; mso-ansi-language: EN-GB;" lang="EN-GB">It</span><span style="font-size: 10pt;" lang="EN-US"> could be a very good solution for congestion avoidance and for better load-balancing purpose</span><span style="font-size: 10pt; font-family: TimesNewRoman;"> where links are running close to capacity. Also, such technique could be useful in inter-domain end-to-end provisioning, where bandwidth reservation has to be negotiated with neighbor ASes (Autonomous System). To be acceptable for real applications such complicated routing algorithm can be significantly improved. Algorithm was tested on the network of <em style="mso-bidi-font-style: normal;">M</em> core routers on the path (between edge routers) and results are given for <em style="mso-bidi-font-style: normal;">N</em>=3 service classes. Further improvements through heuristic approach are made and results are discussed.</span></span></p>2009-04-07T22:28:49+02:00https://jios.foi.hr/index.php/jios/article/view/91An Algorithm for Detecting the Principal Allotment among Fuzzy Clusters and Its Application as a Technique of Reduction of Analyzed Features Space Dimensionality2009-07-06T09:32:32+02:00Dmitri A. Viattcheninviattchenin@mail.ru<span style="font-size: 11pt; font-family: ";Times New Roman";; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;" lang="EN-US">This paper describes a modification of a possibilistic clustering method based on the concept of allotment among fuzzy clusters. Basic ideas of the method are considered and the concept of a principal allotment among fuzzy clusters is introduced. The paper provides the description of the plan of the algorithm for detection principal allotment. An analysis of experimental results of the proposed algorithm’s application to the Tamura’s portrait data in comparison with the basic version of the algorithm and with the NERFCM-algorithm is carried out. A methodology of the algorithm’s application to the <span style="mso-bidi-font-weight: bold;">dimensionality reduction</span><strong style="mso-bidi-font-weight: normal;"> </strong>problem is outlined and the application of the methodology is illustrated on the example of Anderson’s Iris data <span style="mso-bidi-font-weight: bold;">in comparison with the result of principal component analysis</span>. Preliminary conclusions are formulated also.</span>2009-03-21T20:17:46+01:00https://jios.foi.hr/index.php/jios/article/view/101The Partial Mapping of the Web Graph2009-07-06T09:32:31+02:00Kristina MachovaKristina.Machova@tuke.skThe paper presents an approach to partial mapping of a web sub-graph. This sub-graph contains the nearest surroundings of an actual web page. Our work deals with acquiring relevant Hyperlinks of a base web site, generation of adjacency matrix, the nearest distance matrix and matrix of converted distances of Hyperlinks, detection of compactness of web representation, and visualization of its graphical representation. The paper introduces an LWP algorithm – a technique for Hyperlink filtration. This work attempts to help users with the orientation within the web graph.2009-03-06T19:33:26+01:00https://jios.foi.hr/index.php/jios/article/view/108Application of Benford's Law in Payment Systems Auditing2009-07-06T09:32:31+02:00Mario Žgelamario@hnb.hrZdravko KrakarZdravko.Krakar@zih.hr<p class="MsoBodyTextIndent" style="margin: 0in 18.15pt 0pt; text-indent: 14.2pt;"><span style="font-style: normal; mso-ansi-language: EN-GB;" lang="EN-GB"><span style="font-size: x-small; font-family: Times New Roman;">Information systems auditing activities are mandatory in today business environments. There are numerous useful methods that can be conducted in such audits. One of contemporary methods is application of so-called Benford's Law. In this paper we examine ways of application of this law in investigation of certain number set with aim to make a conclusion if number set conforms to Benford's Law. As an examination target we used foreign payment system messages which are issued between foreign and domestic business entities i.e. commercial and central banks. We chose sample of 1.745.311 transactions and conducted examination for first, second and first two digits. We examine certain data subsets, created according to certain payment types, and investigate how Benford’s Law tests can be used in auditing. We also compare practical usefulness and note differences between various conformity tests in auditing environment. Results we achieved prove adequate potential of this law in audit practice.</span></span><span style="font-size: 11pt; font-style: normal; mso-ansi-language: PL; mso-bidi-font-size: 10.0pt;" lang="PL"></span></p>2009-03-01T12:36:24+01:00https://jios.foi.hr/index.php/jios/article/view/84Theory of Microcrediting in Transitional Economies2009-07-06T09:32:31+02:00Nikola Kadoićnkadoic@foi.hrMatija Kopićmkopic@foi.hrIn the early 1970s, Bangladeshi banker and economist Dr. Muhammad Yunus designed microcrediting – a socially sensitive and rightful system of fighting poverty and high unemployment rates. His Grameen Bank for the poorest of the poor in Bangladesh has so far lifted more than 3.2 million of individuals and their families out of poverty. After initial successes at home, microcredit was put into service for reducing unemployment and alleviating poverty in numerous countries throughout the world. This paper explores specific problems that a typical transitional country (like Croatia), is likely to face, with unemployment – the source of a vast number of related problems in a transitional society – as the focal point. The authors have attempted to incorporate particularities of a transitional economy into the original microcrediting principles. As a solution to problems afflicting the domestic economy, the authors define a global microcrediting system framework on the macroeconomic level, assuming at the same time that microcrediting of socially vulnerable groups can resolve many problems of modern transitional societies. Arising from the authors' primary intention – to consider in depth the functionality of microcrediting in general transition conditions – a transitional microcrediting system has been defined in general terms, and a corresponding financial and mathematical model developed.2008-12-11T18:37:18+01:00https://jios.foi.hr/index.php/jios/article/view/68Conceptual Modelling of Complex Production Systems2010-01-22T16:14:18+01:00Nenad Peršinenad.persi@foi.hrComplex system dynamics, structure and behaviour performances call for a wide range of methods, algorithms and tools to reach a model capable of finding optimal performing parameters. In the modelling process, it is up to the analyst to select the appropriate combination of methods, algorithms and tools to express significant system performances. Such a methodology for designing complex systems should be based upon conceptual modelling to perform a sensitive analysis of different system levels and views, allowing system representations for developing computer models.Complex systems, such as business systems with a continuous-discrete production process, require a well organised supply chain highly reactive to production assortment changes. Aligning two different production components distinctive in their behaviour is especially delicate at the production parameters transition point. Such system performances require distinctive designing methods that can follow the double nature of the production process behaviour in accordance with their entities dynamics caused by assortment changes. Consequently, such systems need different conceptual presentations for their purpose to be realized from different views and aspects. <br />2008-12-09T13:59:46+01:00https://jios.foi.hr/index.php/jios/article/view/86From the Editor2008-12-10T07:57:32+01:00Neven Vrčekneven.vrcek@foi.hrThe Journal of Information and Organizational Sciences – JIOS – is an interdisciplinary scientific journal with a focus on the application of information sciences and advances in organizational sciences, as well as on theoretical contemplations in the fields that impact information sciences, computer sciences and organizational sciences. JIOS is published twice a year, and is managed by a team of professionals, all of whom are employed at the Faculty of Organization and Informatics, University of Zagreb.<br /><br />The Journal’s name and layout have already undergone several changes. As you can see, we have transformed our visual identity, and the format of the published papers has been changed as well. However, it is not only the visual identity of the Journal that we have been working on, as we have also aimed to enhance its visibility, accessibility and referencing. As a result, we are proud to say that the number of databases the Journal is cited in has grown from one to seven, and we are putting a lot of our e. orts into broadening this number in future.<br /><br />As you already know, the Journal’s web address has been changed to www.jios.foi.hr and it is currently being managed by the Open Journal System, in which the entire communication from submitting the paper to its reviewing and publishing is conducted on-line. <br /><br />In this issue of JIOS a selection of five original scientific papers and one review paper has been included covering the following topics: modern production management, fuzzy data, software and information systems development, online privacy and security, and fraud management. We hope you will find the papers interesting and challenging for your own research.<br /><br />Finally, we encourage you to submit your papers and also share with us your recommendations, comments or observations about papers already published. In that respect, we would very much appreciate your willingness to become a peer-reviewer for submitted papers, and thus contribute to the rising quality of JIOS.<br />2008-12-09T13:58:27+01:00https://jios.foi.hr/index.php/jios/article/view/63Factors and Predictors of Online Security and Privacy Behavior2008-12-09T14:27:11+01:00Goran Bubašgoran.bubas@foi.hrTihomir Orehovačkitihomir.orehovacki@foi.hrMario Koneckimario.konecki@foi.hrAssumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills) that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1) and data loss on the home computer (C2) on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.<br /><br />2008-12-05T20:33:28+01:00https://jios.foi.hr/index.php/jios/article/view/80Holistic approach to fraud management in health insurance2008-12-09T14:27:12+01:00Štefan Furlanstefan.furlan@gmail.comMarko Bajecmarko.bajec@fri.uni-lj.siFraud present an immense problem for health insurance companies and the only way to fight fraud is by using specialized fraud management systems. The current research community focussed great efforts on different fraud detection techniques while neglecting other also important activities of fraud management. We propose a holistic approach that focuses on all 6 activities of fraud management, namely, (1) deterrence, (2) prevention, (3) detection, (4) investigation, (5) sanction and redress, and (6) monitoring. The main contribution of the paper are 15 key characteristics of a fraud management system, which enable construction of a fraud management system that provides effective and efficient support to all fraud management activities. We base our research on literature review, interviews with experts from different fields, and a case study. The case study provides additional confirmation to expert opinions, as it puts our holistic framework into practice.<br />2008-11-29T22:16:14+01:00https://jios.foi.hr/index.php/jios/article/view/72Method for Estimating the Complexity of Designing Business Information Systems2012-04-19T16:25:19+02:00Patrizia Poščićpatrizia@ffri.hrMile Pavlićmile.pavlic@ris.hrNeven Vrčeknvrcek@foi.hrThe most used method for determining the complexity of information systems is the function point method. This paper illustrates the new method, Data on Document (DOD) for estimating the complexity of designing business information systems. Similar methods are shown in brief. The objective is to explain the reasons for using the newly defined DOD method instead of the function point method. The new method is easier to use while the usage of function point method takes a lot of time and effort, and is more complex. The DOD method is compared to the function point method. A high degree of correlation was determined in observed information systems. The DOD method helps in early stages of the development of information systems, when it is not possible to apply the function point method.<br />2008-11-20T20:08:30+01:00https://jios.foi.hr/index.php/jios/article/view/79Java Applications Development Based on Component and Metacomponent Approach2008-12-09T14:30:03+01:00Danijel Radoševićdanijel.radosevic@foi.hrMario Koneckimario.konecki@foi.hrTihomir Orehovačkitihomir.orehovacki@foi.hrComponent based modeling offers new and improved approach to design, construction, implementation and evolution of software applications development. This kind of software applications development is usually represented by appropriate component model/diagram. UML, for example, offers component diagram for representation of this kind of model. On the other hand, metacomponents usage offers some new features which hardly could be achieved by using generic components. Firstly, implementation of program properties which are dispersed on different classes and other program units, i.e. aspects, is offered. This implies using automated process of assembling components and their interconnection for building applications, according to appropriate model offered in this paper, which also offers generic components usage. Benefits of this hybrid process are higher flexibility achieved by automated connection process, optimization through selective features inclusion and easier application maintenance and development. In this paper we offer an approach of application development based on hybrid component/metacomponent model. The component model is given by UML diagrams, while the metacomponent model is given by generator scripting model. We explain that hybrid approach on an example of Java Web application development.2008-11-10T13:54:49+01:00https://jios.foi.hr/index.php/jios/article/view/74A Heuristic Approach to Possibilistic Clustering for Fuzzy Data2008-12-09T14:27:12+01:00Dmitri A. Viattcheninviattchenin@mail.ru<span style="font-family: TimesNewRomanPSMT; font-size: x-small;"><span style="font-family: TimesNewRomanPSMT; font-size: x-small;"><p align="left">The paper deals with the problem of the fuzzy data clustering. In other words, objects attributes can be represented by fuzzy numbers or fuzzy intervals. A direct algorithm of possibilistic clustering is the basis of an approach to the fuzzy data clustering. The paper provides the basic ideas of the method of clustering and a plan of the direct possibilistic clustering algorithm. Definitions of fuzzy intervals and fuzzy numbers are presented and distances for fuzzy numbers are considered. A concept of a vector of fuzzy numbers is introduced and the fuzzy data preprocessing methodology for constructing of a fuzzy tolerance matrix is described. A numerical example is given and results of application of the direct possibilistic clustering algorithm to a set of vectors of triangular fuzzy numbers are considered in the example. Some preliminary conclusions are stated.</p></span></span>2008-08-18T20:43:03+02:00https://jios.foi.hr/index.php/jios/article/view/54An Uncontrolled Item of Enterprise ICT Innovation: the High Level Digital Divide2008-07-31T12:40:10+02:00Maurizio Pighinmaurizio.pighin@uniud.itAnna Marzonamarzona@dss.uniud.itThe globalization phenomena strongly stresses western countries’ economies. Especially in industrial districts, companies are reacting with continuous innovations in product and process, based mainly on the introduction of ICT. This continuous organizational change process forces employees to keep in touch with the working environment in an endless learning process. Therefore, the introduction of new ICT seems to bring a cultural development for individuals. Is this always true? Our conviction is that the strong ICT impact generates a new form of digital-divide, a “High-Level Digital Divide” (HLDD): an increasing cultural distance between people able to follow the enterprise ICT evolution and complexity, and people with a lower cultural growth ability. An uncontrolled growth of HLDD may limit the evolution capacity of the enterprise and drop out people from labor market.2008-07-04T19:22:12+02:00https://jios.foi.hr/index.php/jios/article/view/53Benchmarking User Perceived Impact for Web Portal Success Evaluation2008-07-17T09:30:30+02:00Daniel Delicdelic@zedat.fu-berlin.deHans-J. Lenzlenz@zeda.fu-berlin.deWe describe an approach for success evaluation of Web portals by benchmarking user perceived impact with Multiple-Criteria Decision Analysis (MCDA). For impact measurement a questionnaire is used. The method is applied in a case study of four eGovernment portals and results are discussed.2008-07-04T19:21:37+02:00https://jios.foi.hr/index.php/jios/article/view/71Modeling Organizational Design - Applying A Formalism Model From Theoretical Physics2008-07-17T09:32:03+02:00Robert Fabacrobert.fabac@foi.hrJosip Stepanićjosip.j.stepanic@fsb.hrModern organizations are exposed to diverse external environment influences. Currently accepted concepts of organizational design take into account structure, its interaction with strategy, processes, people, etc. Organization design and planning aims to align this key organizational design variables. At the higher conceptual level, however, completely satisfactory formulation for this alignment doesn’t exist. We develop an approach originating from the application of concepts of theoretical physics to social systems. Under this approach, the allocation of organizational resources is analyzed in terms of social entropy, social free energy and social temperature. This allows us to formalize the dynamic relationship between organizational design variables. In this paper we relate this model to Galbraith's Star Model and we also suggest improvements in the procedure of the complex analytical method in organizational design.2008-06-16T13:24:14+02:00https://jios.foi.hr/index.php/jios/article/view/55An Investigation of Marketing via Mobile Devices - Attitudes of Croatian Marketing Experts2008-07-17T09:31:30+02:00Damir Dobrinićdamir.dobrinic@posta.hrStjepan Dvorskisdvorski@foi.hrNeven Bosiljneven.bosilj@t-mobile.hrMarketing activities supported by mobile devices offer great opportunities for direct communication with consumers without the barriers of time, place, location and other. This article explores opinions and expectations Croatian marketing experts have towards use of m-advertising and other available advertising media, where we take the perspective of marketing experts to predict the future of m-marketing and m-advertising in Croatia. The paper also discusses the relevance of m-advertising and investigates the future of m-marketing and m-advertising in Croatia. This research focuses mainly on understanding the potential and effectiveness of the use of mobile phones as a promotional medium, but we also try to recognize the level of concern of marketing experts associated with spam, relating to privacy intrusion and ethics components in m-advertising. Privacy and ethics concerns could create resistance to the adoption of m-advertising. Media selection becomes the most critical factor for the success of a promotional and advertising marketing campaign. Croatian experts still consider TV or newspapers the best way to reach a large number of potential consumers, but what are their expectations towards mobile advertising? To answer this question, we built a model that links attitudes towards advertising via classical media to the intention to use m-advertising.2008-06-16T13:23:52+02:00https://jios.foi.hr/index.php/jios/article/view/59Shot Boundary Detection in Soccer Video using Twin-comparison Algorithm and Dominant Color Region2008-07-17T09:31:46+02:00Matko Šarićmsaric@fesb.hrHrvoje Dujmićhdujmic@fesb.hrDomagoj Baričevićdbaricev@fesb.hrThe first step in generic video processing is temporal segmentation, i.e. shot boundary detection. Camera shot transitions can be either abrupt (e.g. cuts) or gradual (e.g. fades, dissolves, wipes). Sports video is one of the most challenging domains for robust shot boundary detection. We proposed a shot boundary detection algorithm for soccer video based on the twin-comparison method and the absolute difference between frames in their ratios of dominant colored pixels to total number of pixels. With this approach the detection of gradual transitions is improved by decreasing the number of false positives caused by some camera operations. We also compared performances of our algorithm and the standard twin-comparison method.2008-06-16T13:22:35+02:00https://jios.foi.hr/index.php/jios/article/view/49Evaluation Framework for Quality Management Software2008-07-17T09:30:48+02:00Nadica Hrgareknadica.hrgarek@gmail.com<p>Identifying and specifying user requirements is an integral part of information systems design and is critical for the project success. More than 50% of the reasons for the project failure presented in the CHAOS report [36] and study of a US Air Force project by Sheldon et al. [33] are related to requirements. The goal of this paper is to assess the relevant user and software requirements which are the basis for an electronic quality management system selection in medical device companies. This paper describes the structured evaluation and selection process of different quality management software tools that shall support business processes. The purpose of this paper is to help the small to medium size medical device companies to choose the right quality management software which meets the company's business needs.</p>2008-06-03T12:44:55+02:00https://jios.foi.hr/index.php/jios/article/view/5PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY2008-07-16T12:51:25+02:00Slaven BrumecSlaven.Brumec@in2.hrThis article focuses on an application of the Triandis Model in researching Internet usage and the intention to use Internet. Unlike other TAM-based studies undertaken to date, the Triandis Model offers a sociological account of interaction between the various factors, particularly attitude, intention, and behavior. The technique of Structural Equation Modeling was used to assess the impact those factors have on intention to use the Internet in accordance with the relationships posited by the Triandis Model. The survey was administered to Croatian undergraduate students at and employed individuals. The survey results are compared to the results of a similar survey that was carried out by two universities in Hong Kong.2008-03-14T10:09:24+01:00https://jios.foi.hr/index.php/jios/article/view/4FINGERPRINTS PREPROCESSING USING WALSH FUNCTIONS2008-03-14T10:10:53+01:00Miroslav Bačamiroslav.baca@foi.hrKornelije Rabuzinkornelije.rabuzin@foi.hrMinutiae classification and fingerprint classification in fingerprint evaluating process are very important. Fingerprint image contains about 150 minutiae’s. When we compare two fingerprint images, we compare latent and non latent fingerprint and we try to find 12 minutiae’s placed on the same position on latent and non latent fingerprint images. After fingerprint image pre-processing we can perform classification or we can try to find minutiae. In this paper we describe the process of minutiae classification for comparison purposes. For that purpose we use Walsh function and Walsh transforms. Paper describes minutiae classification which is relatively new in recognition systems and gives contribution for development of practical fingerprint recognition systems. Paper also gives contribution in the theoretical part due to the fact that Walsh functions were not implemented in fingerprint pre-processing systems so far. The new symbolic database model for fingerprint storage gives multifunctional foundations for future research.2008-03-14T10:08:52+01:00